diff --git a/.changelog/10478.txt b/.changelog/10478.txt deleted file mode 100644 index 8c2679bf26..0000000000 --- a/.changelog/10478.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -structs: prohibit config entries from referencing more than one partition at a time -``` diff --git a/.changelog/10507.txt b/.changelog/10507.txt deleted file mode 100644 index aa331651fe..0000000000 --- a/.changelog/10507.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -connect: include optional partition prefixes in SPIFFE identifiers -``` diff --git a/.changelog/10572.txt b/.changelog/10572.txt deleted file mode 100644 index 03388d2b86..0000000000 --- a/.changelog/10572.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -config: add agent config flag for enterprise clients to indicate they wish to join a particular partition -``` diff --git a/.changelog/11080.txt b/.changelog/11080.txt deleted file mode 100644 index 253b132eef..0000000000 --- a/.changelog/11080.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -api: add partition field to acl structs -``` diff --git a/.changelog/11129.txt b/.changelog/11129.txt deleted file mode 100644 index 9d1d65a8bb..0000000000 --- a/.changelog/11129.txt +++ /dev/null @@ -1,4 +0,0 @@ -```release-note:improvement -ui: Add initial support for partitions to intentions -``` - diff --git a/.changelog/11188.txt b/.changelog/11188.txt deleted file mode 100644 index d8d62daa02..0000000000 --- a/.changelog/11188.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Added initial support for admin partition CRUD -``` diff --git a/.changelog/11263.txt b/.changelog/11263.txt deleted file mode 100644 index 592bbbc41e..0000000000 --- a/.changelog/11263.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -acl: **(Enterprise only)** Fix bug in 'consul members' filtering with partitions. -``` diff --git a/.changelog/11323.txt b/.changelog/11323.txt deleted file mode 100644 index c6e7c34ded..0000000000 --- a/.changelog/11323.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -acl: **(Enterprise only)** ensure that auth methods with namespace rules work with partitions -``` diff --git a/.changelog/11429.txt b/.changelog/11429.txt deleted file mode 100644 index bff9f6c3a8..0000000000 --- a/.changelog/11429.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -agent: refactor the agent delegate interface to be partition friendly -``` diff --git a/.changelog/11431.txt b/.changelog/11431.txt deleted file mode 100644 index e548b90231..0000000000 --- a/.changelog/11431.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -connect: **(Enterprise only)** add support for dialing upstreams in remote partitions through mesh gateways. -``` diff --git a/.changelog/11433.txt b/.changelog/11433.txt deleted file mode 100644 index dfa6aa4ac9..0000000000 --- a/.changelog/11433.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -connect: **(Enterprise only)** updates ServiceRead and NodeRead to account for the partition-exports config entry. -``` \ No newline at end of file diff --git a/.changelog/11444.txt b/.changelog/11444.txt deleted file mode 100644 index d96e6baba9..0000000000 --- a/.changelog/11444.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -agent: for various /v1/agent endpoints parse the partition parameter on the request -``` diff --git a/.changelog/11446.txt b/.changelog/11446.txt deleted file mode 100644 index 49f7cee40a..0000000000 --- a/.changelog/11446.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -cli: update consul members output to display partitions and sort the results usefully -``` diff --git a/.changelog/11479.txt b/.changelog/11479.txt deleted file mode 100644 index 3da6e7feb5..0000000000 --- a/.changelog/11479.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -ui: When switching partitions reset the namespace back to the tokens default namespace or default -``` diff --git a/.changelog/11541.txt b/.changelog/11541.txt deleted file mode 100644 index 6a8617dba3..0000000000 --- a/.changelog/11541.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -partitions: Prevent writing partition-exports entries to secondary DCs. -``` \ No newline at end of file diff --git a/.changelog/11566.txt b/.changelog/11566.txt deleted file mode 100644 index 460617da54..0000000000 --- a/.changelog/11566.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -connect: **(Enterprise only)** Allow ingress gateways to target services in another partition -``` \ No newline at end of file diff --git a/.changelog/11591.txt b/.changelog/11591.txt deleted file mode 100644 index 5efad80242..0000000000 --- a/.changelog/11591.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -ui: Ensure the UI stores the default partition for the users token -``` diff --git a/.changelog/11604.txt b/.changelog/11604.txt deleted file mode 100644 index d3b585e73d..0000000000 --- a/.changelog/11604.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -ui: Add partition support for SSO -``` diff --git a/.changelog/11654.txt b/.changelog/11654.txt deleted file mode 100644 index 6a88f2c5dc..0000000000 --- a/.changelog/11654.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Include `Service.Partition` into available variables for `dashboard_url_templates` -``` diff --git a/.changelog/11656.txt b/.changelog/11656.txt deleted file mode 100644 index 10dc472850..0000000000 --- a/.changelog/11656.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Don't offer a 'Valid Datacenters' option when editing policies for non-default partitions -``` diff --git a/.changelog/11666.txt b/.changelog/11666.txt deleted file mode 100644 index 65080a0681..0000000000 --- a/.changelog/11666.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Upgrade Lock Sessions to use partitions -``` diff --git a/.changelog/11668.txt b/.changelog/11668.txt deleted file mode 100644 index 314bbfe575..0000000000 --- a/.changelog/11668.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Add documentation link to Partition empty state -``` diff --git a/.changelog/11679.txt b/.changelog/11679.txt deleted file mode 100644 index daf39eb849..0000000000 --- a/.changelog/11679.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Adds support for partitions to the Routing visualization. -``` diff --git a/.changelog/11680.txt b/.changelog/11680.txt deleted file mode 100644 index 57617f706f..0000000000 --- a/.changelog/11680.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -server: block enterprise-specific partition-exports config entry from being used in OSS Consul. -``` \ No newline at end of file diff --git a/.changelog/11696.txt b/.changelog/11696.txt deleted file mode 100644 index 5723a5a74c..0000000000 --- a/.changelog/11696.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Adds support for partitions to Service and Node Identity template visuals. -``` diff --git a/.changelog/11699.txt b/.changelog/11699.txt deleted file mode 100644 index 32949238bc..0000000000 --- a/.changelog/11699.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -auto-config: ensure the feature works properly with partitions -``` diff --git a/.changelog/11702.txt b/.changelog/11702.txt deleted file mode 100644 index bd3b4f2392..0000000000 --- a/.changelog/11702.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -ui: Adds basic support for showing Services exported from another partition. -``` diff --git a/.changelog/11737.txt b/.changelog/11737.txt deleted file mode 100644 index 4c4addb2a8..0000000000 --- a/.changelog/11737.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -partitions: **(Enterprise only)** rename APIs, commands, and public types to use "partition" rather than "admin partition". -``` \ No newline at end of file diff --git a/.changelog/11738.txt b/.changelog/11738.txt deleted file mode 100644 index 6584863e41..0000000000 --- a/.changelog/11738.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -connect: **(Enterprise only)** add support for cross-partition transparent proxying. -``` \ No newline at end of file diff --git a/.changelog/11739.txt b/.changelog/11739.txt deleted file mode 100644 index 6040dddf77..0000000000 --- a/.changelog/11739.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -api: **(Enterprise Only)** rename partition-exports config entry to exported-services. -``` \ No newline at end of file diff --git a/.changelog/11747.txt b/.changelog/11747.txt deleted file mode 100644 index 010eac4605..0000000000 --- a/.changelog/11747.txt +++ /dev/null @@ -1,4 +0,0 @@ -```release-note:feature -ui: Add basic partition tooltips to failovers and redirects in the routing -visualization -``` diff --git a/.changelog/11757.txt b/.changelog/11757.txt deleted file mode 100644 index 897fa1fccd..0000000000 --- a/.changelog/11757.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -connect: **(Enterprise only)** add support for targeting partitions in discovery chain routes, splits, and redirects. -``` \ No newline at end of file diff --git a/.changelog/11758.txt b/.changelog/11758.txt deleted file mode 100644 index 21436d5e53..0000000000 --- a/.changelog/11758.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -rpc: unset partition before forwarding to remote datacenter -``` diff --git a/.changelog/11782.txt b/.changelog/11782.txt deleted file mode 100644 index 631169480e..0000000000 --- a/.changelog/11782.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -acl: **(Enterprise only)** ensure that the agent recovery token is properly partitioned -``` diff --git a/.changelog/11786.txt b/.changelog/11786.txt deleted file mode 100644 index af9283ae58..0000000000 --- a/.changelog/11786.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -connect: update SNI label extraction to support new taxonomy for partitions -``` diff --git a/.changelog/11855.txt b/.changelog/11855.txt new file mode 100644 index 0000000000..ea77b6b841 --- /dev/null +++ b/.changelog/11855.txt @@ -0,0 +1,4 @@ +```release-note:feature +Admin Partitions (Consul Enterprise only) This version adds admin partitions, a new entity defining administrative and networking boundaries within a Consul deployment. For more information refer to the + [Admin Partition](https://www.consul.io/docs/enterprise/admin-partitions) documentation. +``` diff --git a/.changelog/_1202.txt b/.changelog/_1202.txt deleted file mode 100644 index 8b6e0da52e..0000000000 --- a/.changelog/_1202.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -partitions: **(Enterprise only)** segment serf LAN gossip between nodes in different partitions -``` diff --git a/.changelog/_1203.txt b/.changelog/_1203.txt deleted file mode 100644 index a23f98b6c5..0000000000 --- a/.changelog/_1203.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -state: reads of partitions now accept an optional memdb.WatchSet -``` diff --git a/.changelog/_1284.txt b/.changelog/_1284.txt deleted file mode 100644 index dd17e0990f..0000000000 --- a/.changelog/_1284.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -state: **(Enterprise Only)** ensure partition delete triggers namespace deletes -``` diff --git a/.changelog/_1300.txt b/.changelog/_1300.txt deleted file mode 100644 index b316ea7608..0000000000 --- a/.changelog/_1300.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -partitions: **(Enterprise only)** fix panic when forwarding delete operations to the leader -``` diff --git a/.changelog/_1342.txt b/.changelog/_1342.txt deleted file mode 100644 index 7edca2afcd..0000000000 --- a/.changelog/_1342.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:improvement -namespaces: **(Enterprise only)** policy and role defaults can reference policies in any namespace in the same partition by ID -``` diff --git a/.changelog/_1391.txt b/.changelog/_1391.txt deleted file mode 100644 index f1dbe4909f..0000000000 --- a/.changelog/_1391.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -partitions: **(Enterprise only)** Ensure partitions and serf-based WAN federation are mutually exclusive. -``` diff --git a/.changelog/_1411.txt b/.changelog/_1411.txt deleted file mode 100644 index efa2dcbb5d..0000000000 --- a/.changelog/_1411.txt +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:bug -namespaces: **(Enterprise only)** ensure namespace deletion is partition-safe -``` diff --git a/.changelog/_987.md b/.changelog/_987.md deleted file mode 100644 index 71363a894e..0000000000 --- a/.changelog/_987.md +++ /dev/null @@ -1,3 +0,0 @@ -```release-note:feature -partitions: **(Enterprise only)** Adds admin partitions, a new feature to enhance Consul's multitenancy capabilites. -``` diff --git a/CHANGELOG.md b/CHANGELOG.md index b8db474ac7..cc160bb6cd 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,247 +1,125 @@ -## 1.11.0-rc (December 08, 2021) - -BREAKING CHANGES: - -* cli: `consul acl set-agent-token master` has been replaced with `consul acl set-agent-token recovery` [[GH-11669](https://github.com/hashicorp/consul/issues/11669)] - -FEATURES: - -* partitions: **(Enterprise only)** Ensure partitions and serf-based WAN federation are mutually exclusive. -* ui: Add documentation link to Partition empty state [[GH-11668](https://github.com/hashicorp/consul/issues/11668)] -* ui: Adds basic support for showing Services exported from another partition. [[GH-11702](https://github.com/hashicorp/consul/issues/11702)] -* ui: Adds support for partitions to Service and Node Identity template visuals. [[GH-11696](https://github.com/hashicorp/consul/issues/11696)] -* ui: Adds support for partitions to the Routing visualization. [[GH-11679](https://github.com/hashicorp/consul/issues/11679)] -* ui: Don't offer a 'Valid Datacenters' option when editing policies for non-default partitions [[GH-11656](https://github.com/hashicorp/consul/issues/11656)] -* ui: Include `Service.Partition` into available variables for `dashboard_url_templates` [[GH-11654](https://github.com/hashicorp/consul/issues/11654)] -* ui: Upgrade Lock Sessions to use partitions [[GH-11666](https://github.com/hashicorp/consul/issues/11666)] - -IMPROVEMENTS: - -* agent: **(Enterprise only)** purge service/check registration files for incorrect partitions on reload [[GH-11607](https://github.com/hashicorp/consul/issues/11607)] -* agent: add variation of force-leave that exclusively works on the WAN [[GH-11722](https://github.com/hashicorp/consul/issues/11722)] -* api: **(Enterprise Only)** rename partition-exports config entry to exported-services. [[GH-11739](https://github.com/hashicorp/consul/issues/11739)] -* auto-config: ensure the feature works properly with partitions [[GH-11699](https://github.com/hashicorp/consul/issues/11699)] -* connect: **(Enterprise only)** add support for cross-partition transparent proxying. [[GH-11738](https://github.com/hashicorp/consul/issues/11738)] -* connect: **(Enterprise only)** add support for targeting partitions in discovery chain routes, splits, and redirects. [[GH-11757](https://github.com/hashicorp/consul/issues/11757)] -* connect: Consul will now generate a unique virtual IP for each connect-enabled service (this will also differ across namespace/partition in Enterprise). [[GH-11724](https://github.com/hashicorp/consul/issues/11724)] -* connect: Support Vault auth methods for the Connect CA Vault provider. Currently, we support any non-deprecated auth methods -the latest version of Vault supports (v1.8.5), which include AppRole, AliCloud, AWS, Azure, Cloud Foundry, GitHub, Google Cloud, -JWT/OIDC, Kerberos, Kubernetes, LDAP, Oracle Cloud Infrastructure, Okta, Radius, TLS Certificates, and Username & Password. [[GH-11573](https://github.com/hashicorp/consul/issues/11573)] -* dns: Added a `virtual` endpoint for querying the assigned virtual IP for a service. [[GH-11725](https://github.com/hashicorp/consul/issues/11725)] -* partitions: **(Enterprise only)** rename APIs, commands, and public types to use "partition" rather than "admin partition". [[GH-11737](https://github.com/hashicorp/consul/issues/11737)] -* raft: Added a configuration to disable boltdb freelist syncing [[GH-11720](https://github.com/hashicorp/consul/issues/11720)] -* raft: Emit boltdb related performance metrics [[GH-11720](https://github.com/hashicorp/consul/issues/11720)] -* raft: Use bbolt instead of the legacy boltdb implementation [[GH-11720](https://github.com/hashicorp/consul/issues/11720)] -* sentinel: **(Enterprise Only)** Sentinel now uses SHA256 to generate policy ids -* server: block enterprise-specific partition-exports config entry from being used in OSS Consul. [[GH-11680](https://github.com/hashicorp/consul/issues/11680)] -* types: add TLSVersion and TLSCipherSuite [[GH-11645](https://github.com/hashicorp/consul/issues/11645)] -* ui: Add partition support for SSO [[GH-11604](https://github.com/hashicorp/consul/issues/11604)] -* ui: Update global notification styling [[GH-11577](https://github.com/hashicorp/consul/issues/11577)] - -DEPRECATIONS: - -* api: `/v1/agent/token/agent_master` is deprecated and will be removed in a future major release - use `/v1/agent/token/agent_recovery` instead [[GH-11669](https://github.com/hashicorp/consul/issues/11669)] -* config: `acl.tokens.master` has been renamed to `acl.tokens.initial_management`, and `acl.tokens.agent_master` has been renamed to `acl.tokens.agent_recovery` - the old field names are now deprecated and will be removed in a future major release [[GH-11665](https://github.com/hashicorp/consul/issues/11665)] - -BUG FIXES: - -* areas: **(Enterprise Only)** Fixes a bug when using Yamux pool ( for servers version 1.7.3 and later), the entire pool was locked while connecting to a remote location, which could potentially take a long time. [[GH-1368](https://github.com/hashicorp/consul/issues/1368)] -* areas: **(Enterprise only)** make the gRPC server tracker network area aware [[GH-11748](https://github.com/hashicorp/consul/issues/11748)] -* ca: fixes a bug that caused non blocking leaf cert queries to return the same cached response regardless of ca rotation or leaf cert expiry [[GH-11693](https://github.com/hashicorp/consul/issues/11693)] -* ca: fixes a bug that caused the SigningKeyID to be wrong in the primary DC, when the Vault provider is used, after a CA config creates a new root. [[GH-11672](https://github.com/hashicorp/consul/issues/11672)] -* ca: fixes a bug that caused the intermediate cert used to sign leaf certs to be missing from the /connect/ca/roots API response when the Vault provider was used. [[GH-11671](https://github.com/hashicorp/consul/issues/11671)] -* ui: Fix inline-code brand styling [[GH-11578](https://github.com/hashicorp/consul/issues/11578)] -* ui: Fix visual issue with slight table header overflow [[GH-11670](https://github.com/hashicorp/consul/issues/11670)] -* ui: Fixes an issue where under some circumstances after logging we present the -data loaded previous to you logging in. [[GH-11681](https://github.com/hashicorp/consul/issues/11681)] -* ui: Include `Service.Namespace` into available variables for `dashboard_url_templates` [[GH-11640](https://github.com/hashicorp/consul/issues/11640)] - -## 1.11.0-beta3 (November 17, 2021) - -SECURITY: - -* agent: Use SHA256 instead of MD5 to generate persistence file names. [[GH-11491](https://github.com/hashicorp/consul/issues/11491)] -* namespaces: **(Enterprise only)** Creating or editing namespaces that include default ACL policies or ACL roles now requires `acl:write` permission in the default namespace. This change fixes CVE-2021-41805. - -FEATURES: - -* ca: Add a configurable TTL for Connect CA root certificates. The configuration is supported by the Vault and Consul providers. [[GH-11428](https://github.com/hashicorp/consul/issues/11428)] -* ca: Add a configurable TTL to the AWS ACM Private CA provider root certificate. [[GH-11449](https://github.com/hashicorp/consul/issues/11449)] -* health-checks: add support for h2c in http2 ping health checks [[GH-10690](https://github.com/hashicorp/consul/issues/10690)] -* partitions: **(Enterprise only)** segment serf LAN gossip between nodes in different partitions -* ui: Adding support of Consul API Gateway as an external source. [[GH-11371](https://github.com/hashicorp/consul/issues/11371)] -* ui: Topology - New views for scenarios where no dependencies exist or ACLs are disabled [[GH-11280](https://github.com/hashicorp/consul/issues/11280)] - -IMPROVEMENTS: - -* ci: Artifact builds will now only run on merges to the release branches or to `main` [[GH-11417](https://github.com/hashicorp/consul/issues/11417)] -* ci: The Linux packages are now available for all supported Linux architectures including arm, arm64, 386, and amd64 [[GH-11417](https://github.com/hashicorp/consul/issues/11417)] -* ci: The Linux packaging service configs and pre/post install scripts are now available under [.release/linux] [[GH-11417](https://github.com/hashicorp/consul/issues/11417)] -* config: warn the user if client_addr is empty because client services won't be listening [[GH-11461](https://github.com/hashicorp/consul/issues/11461)] -* connect/ca: Return an error when querying roots from uninitialized CA. [[GH-11514](https://github.com/hashicorp/consul/issues/11514)] -* connect: **(Enterprise only)** Allow ingress gateways to target services in another partition [[GH-11566](https://github.com/hashicorp/consul/issues/11566)] -* connect: add Namespace configuration setting for Vault CA provider [[GH-11477](https://github.com/hashicorp/consul/issues/11477)] -* namespaces: **(Enterprise only)** policy and role defaults can reference policies in any namespace in the same partition by ID -* partitions: Prevent writing partition-exports entries to secondary DCs. [[GH-11541](https://github.com/hashicorp/consul/issues/11541)] -* sdk: Add support for iptable rules that allow DNS lookup redirection to Consul DNS. [[GH-11480](https://github.com/hashicorp/consul/issues/11480)] -* segments: **(Enterprise only)** ensure that the serf_lan_allowed_cidrs applies to network segments [[GH-11495](https://github.com/hashicorp/consul/issues/11495)] -* ui: Add upstream icons for upstreams and upstream instances [[GH-11556](https://github.com/hashicorp/consul/issues/11556)] -* ui: Update UI browser support to 'roughly ~2 years back' [[GH-11505](https://github.com/hashicorp/consul/issues/11505)] -* ui: When switching partitions reset the namespace back to the tokens default namespace or default [[GH-11479](https://github.com/hashicorp/consul/issues/11479)] -* ui: added copy to clipboard button in code editor toolbars [[GH-11474](https://github.com/hashicorp/consul/issues/11474)] - -BUG FIXES: - -* acl: **(Enterprise only)** fix namespace and namespace_prefix policy evaluation when both govern an authz request -* api: ensure new partition fields are omit empty for compatibility with older versions of consul [[GH-11585](https://github.com/hashicorp/consul/issues/11585)] -* connect/ca: Allow secondary initialization to resume after being deferred due to unreachable or incompatible primary DC servers. [[GH-11514](https://github.com/hashicorp/consul/issues/11514)] -* connect: fix issue with attempting to generate an invalid upstream cluster from UpstreamConfig.Defaults. [[GH-11245](https://github.com/hashicorp/consul/issues/11245)] -* macos: fixes building with a non-Apple LLVM (such as installed via Homebrew) [[GH-11586](https://github.com/hashicorp/consul/issues/11586)] -* namespaces: **(Enterprise only)** ensure the namespace replicator doesn't replicate deleted namespaces -* partitions: **(Enterprise only)** fix panic when forwarding delete operations to the leader -* snapshot: **(Enterprise only)** fixed a bug where the snapshot agent would ignore the `license_path` setting in config files -* snapshot: **(Enterprise only)** snapshot agent no longer attempts to refresh its license from the server when a local license is provided (i.e. via config or an environment variable) -* state: **(Enterprise Only)** ensure partition delete triggers namespace deletes -* ui: **(Enterprise only)** When no namespace is selected, make sure to default to the tokens default namespace when requesting permissions [[GH-11472](https://github.com/hashicorp/consul/issues/11472)] -* ui: Ensure the UI stores the default partition for the users token [[GH-11591](https://github.com/hashicorp/consul/issues/11591)] -* ui: Ensure we check intention permissions for specific services when deciding -whether to show action buttons for per service intention actions [[GH-11409](https://github.com/hashicorp/consul/issues/11409)] -* ui: Filter the global intentions list by the currently selected parition rather -than a wildcard [[GH-11475](https://github.com/hashicorp/consul/issues/11475)] -* ui: Revert to depending on the backend, 'post-user-action', to report -permissions errors rather than using UI capabilities 'pre-user-action' [[GH-11520](https://github.com/hashicorp/consul/issues/11520)] -* ui: code editor styling (layout consistency + wide screen support) [[GH-11474](https://github.com/hashicorp/consul/issues/11474)] -* windows: fixes arm and arm64 builds [[GH-11586](https://github.com/hashicorp/consul/issues/11586)] -* xds: fixes a bug where replacing a mesh gateway node used for WAN federation (with another that has a different IP) could leave gateways in the other DC unable to re-establish the connection [[GH-11522](https://github.com/hashicorp/consul/issues/11522)] - -## 1.11.0-beta2 (November 02, 2021) +## 1.11.0 (December 14, 2021) BREAKING CHANGES: * acl: The legacy ACL system that was deprecated in Consul 1.4.0 has been removed. Before upgrading you should verify that nothing is still using the legacy ACL system. See the [Migrate Legacy ACL Tokens Learn Guide](https://learn.hashicorp.com/tutorials/consul/access-control-token-migration) for more information. [[GH-11232](https://github.com/hashicorp/consul/issues/11232)] +* cli: `consul acl set-agent-token master` has been replaced with `consul acl set-agent-token recovery` [[GH-11669](https://github.com/hashicorp/consul/issues/11669)] -IMPROVEMENTS: +SECURITY: -* agent: for various /v1/agent endpoints parse the partition parameter on the request [[GH-11444](https://github.com/hashicorp/consul/issues/11444)] -* agent: refactor the agent delegate interface to be partition friendly [[GH-11429](https://github.com/hashicorp/consul/issues/11429)] -* cli: Add `-cas` and `-modify-index` flags to the `consul config delete` command to support Check-And-Set (CAS) deletion of config entries [[GH-11419](https://github.com/hashicorp/consul/issues/11419)] -* cli: update consul members output to display partitions and sort the results usefully [[GH-11446](https://github.com/hashicorp/consul/issues/11446)] -* config: Allow ${} style interpolation for UI Dashboard template URLs [[GH-11328](https://github.com/hashicorp/consul/issues/11328)] -* config: Support Check-And-Set (CAS) deletion of config entries [[GH-11419](https://github.com/hashicorp/consul/issues/11419)] -* connect: **(Enterprise only)** add support for dialing upstreams in remote partitions through mesh gateways. [[GH-11431](https://github.com/hashicorp/consul/issues/11431)] -* connect: **(Enterprise only)** updates ServiceRead and NodeRead to account for the partition-exports config entry. [[GH-11433](https://github.com/hashicorp/consul/issues/11433)] -* connect: ingress gateways may now enable built-in TLS for a subset of listeners. [[GH-11163](https://github.com/hashicorp/consul/issues/11163)] -* connect: service-resolver subset filters are validated for valid go-bexpr syntax on write [[GH-11293](https://github.com/hashicorp/consul/issues/11293)] -* connect: update supported envoy versions to 1.20.0, 1.19.1, 1.18.4, 1.17.4 [[GH-11277](https://github.com/hashicorp/consul/issues/11277)] - -DEPRECATIONS: - -* tls: With the upgrade to Go 1.17, the ordering of `tls_cipher_suites` will no longer be honored, and `tls_prefer_server_cipher_suites` is now ignored. [[GH-11364](https://github.com/hashicorp/consul/issues/11364)] - -BUG FIXES: - -* api: fixed backwards compatibility issue with AgentService SocketPath field. [[GH-11318](https://github.com/hashicorp/consul/issues/11318)] -* dns: Fixed an issue where on DNS requests made with .alt_domain response was returned as .domain [[GH-11348](https://github.com/hashicorp/consul/issues/11348)] -* raft: do not trigger an election if not part of the servers list. [[GH-11375](https://github.com/hashicorp/consul/issues/11375)] -* rpc: only attempt to authorize the DNSName in the client cert when verify_incoming_rpc=true [[GH-11255](https://github.com/hashicorp/consul/issues/11255)] -* telemetry: fixes a bug with Prometheus consul_autopilot_failure_tolerance metric where 0 is reported instead of NaN on follower servers. [[GH-11399](https://github.com/hashicorp/consul/issues/11399)] -* ui: Ensure dc selector correctly shows the currently selected dc [[GH-11380](https://github.com/hashicorp/consul/issues/11380)] -* ui: Ensure we filter tokens by policy when showing which tokens use a certain -policy whilst editing a policy [[GH-11311](https://github.com/hashicorp/consul/issues/11311)] - -## 1.11.0-beta1 (October 15, 2021) +* namespaces: **(Enterprise only)** Creating or editing namespaces that include default ACL policies or ACL roles now requires `acl:write` permission in the default namespace. This change fixes CVE-2021-41805. +* rpc: authorize raft requests [CVE-2021-37219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37219) [[GH-10925](https://github.com/hashicorp/consul/issues/10925)] FEATURES: -* partitions: allow for partition queries to be forwarded [[GH-11099](https://github.com/hashicorp/consul/issues/11099)] -* sso/oidc: **(Enterprise only)** Add support for providing acr_values in OIDC auth flow [[GH-11026](https://github.com/hashicorp/consul/issues/11026)] -* ui: Added initial support for admin partition CRUD [[GH-11188](https://github.com/hashicorp/consul/issues/11188)] +* Admin Partitions (Consul Enterprise only) This version adds admin partitions, a new entity defining administrative and networking boundaries within a Consul deployment. For more information refer to the [Admin Partition](https://www.consul.io/docs/enterprise/admin-partitions) documentation. +* ca: Add a configurable TTL for Connect CA root certificates. The configuration is supported by the Vault and Consul providers. [[GH-11428](https://github.com/hashicorp/consul/issues/11428)] +* ca: Add a configurable TTL to the AWS ACM Private CA provider root certificate. [[GH-11449](https://github.com/hashicorp/consul/issues/11449)] +* health-checks: add support for h2c in http2 ping health checks [[GH-10690](https://github.com/hashicorp/consul/issues/10690)] +* ui: Add UI support to use Vault as an external source for a service [[GH-10769](https://github.com/hashicorp/consul/issues/10769)] +* ui: Adding support of Consul API Gateway as an external source. [[GH-11371](https://github.com/hashicorp/consul/issues/11371)] +* ui: Adds a copy button to each composite row in tokens list page, if Secret ID returns an actual ID [[GH-10735](https://github.com/hashicorp/consul/issues/10735)] +* ui: Adds visible Consul version information [[GH-11803](https://github.com/hashicorp/consul/issues/11803)] +* ui: Topology - New views for scenarios where no dependencies exist or ACLs are disabled [[GH-11280](https://github.com/hashicorp/consul/issues/11280)] IMPROVEMENTS: -* api: add partition field to acl structs [[GH-11080](https://github.com/hashicorp/consul/issues/11080)] -* audit-logging: **(Enterprise Only)** Audit logs will now include select HTTP headers in each logs payload. Those headers are: `Forwarded`, `Via`, `X-Forwarded-For`, `X-Forwarded-Host` and `X-Forwarded-Proto`. [[GH-11107](https://github.com/hashicorp/consul/issues/11107)] +* acl: replication routine to report the last error message. [[GH-10612](https://github.com/hashicorp/consul/issues/10612)] +* agent: add variation of force-leave that exclusively works on the WAN [[GH-11722](https://github.com/hashicorp/consul/issues/11722)] +* api: Enable setting query options on agent health and maintenance endpoints. [[GH-10691](https://github.com/hashicorp/consul/issues/10691)] +* checks: add failures_before_warning setting for interval checks. [[GH-10969](https://github.com/hashicorp/consul/issues/10969)] +* ci: Upgrade to use Go 1.17.5 [[GH-11799](https://github.com/hashicorp/consul/issues/11799)] +* cli: Add `-cas` and `-modify-index` flags to the `consul config delete` command to support Check-And-Set (CAS) deletion of config entries [[GH-11419](https://github.com/hashicorp/consul/issues/11419)] +* config: **(Enterprise Only)** Allow specifying permission mode for audit logs. [[GH-10732](https://github.com/hashicorp/consul/issues/10732)] +* config: Support Check-And-Set (CAS) deletion of config entries [[GH-11419](https://github.com/hashicorp/consul/issues/11419)] +* config: add `dns_config.recursor_strategy` flag to control the order which DNS recursors are queried [[GH-10611](https://github.com/hashicorp/consul/issues/10611)] +* config: warn the user if client_addr is empty because client services won't be listening [[GH-11461](https://github.com/hashicorp/consul/issues/11461)] +* connect/ca: cease including the common name field in generated x509 non-CA certificates [[GH-10424](https://github.com/hashicorp/consul/issues/10424)] * connect: Add low-level feature to allow an Ingress to retrieve TLS certificates from SDS. [[GH-10903](https://github.com/hashicorp/consul/issues/10903)] +* connect: Consul will now generate a unique virtual IP for each connect-enabled service (this will also differ across namespace/partition in Enterprise). [[GH-11724](https://github.com/hashicorp/consul/issues/11724)] +* connect: Support Vault auth methods for the Connect CA Vault provider. Currently, we support any non-deprecated auth methods +the latest version of Vault supports (v1.8.5), which include AppRole, AliCloud, AWS, Azure, Cloud Foundry, GitHub, Google Cloud, +JWT/OIDC, Kerberos, Kubernetes, LDAP, Oracle Cloud Infrastructure, Okta, Radius, TLS Certificates, and Username & Password. [[GH-11573](https://github.com/hashicorp/consul/issues/11573)] +* connect: Support manipulating HTTP headers in the mesh. [[GH-10613](https://github.com/hashicorp/consul/issues/10613)] +* connect: add Namespace configuration setting for Vault CA provider [[GH-11477](https://github.com/hashicorp/consul/issues/11477)] +* connect: ingress gateways may now enable built-in TLS for a subset of listeners. [[GH-11163](https://github.com/hashicorp/consul/issues/11163)] +* connect: service-resolver subset filters are validated for valid go-bexpr syntax on write [[GH-11293](https://github.com/hashicorp/consul/issues/11293)] * connect: update supported envoy versions to 1.19.1, 1.18.4, 1.17.4, 1.16.5 [[GH-11115](https://github.com/hashicorp/consul/issues/11115)] -* state: reads of partitions now accept an optional memdb.WatchSet -* telemetry: Add new metrics for the count of KV entries in the Consul store. [[GH-11090](https://github.com/hashicorp/consul/issues/11090)] -* telemetry: Add new metrics for the count of connect service instances and configuration entries. [[GH-11222](https://github.com/hashicorp/consul/issues/11222)] -* ui: Add initial support for partitions to intentions [[GH-11129](https://github.com/hashicorp/consul/issues/11129)] +* connect: update supported envoy versions to 1.20.0, 1.19.1, 1.18.4, 1.17.4 [[GH-11277](https://github.com/hashicorp/consul/issues/11277)] +* debug: Add a new /v1/agent/metrics/stream API endpoint for streaming of metrics [[GH-10399](https://github.com/hashicorp/consul/issues/10399)] +* debug: rename cluster capture target to members, to be more consistent with the terms used by the API. [[GH-10804](https://github.com/hashicorp/consul/issues/10804)] +* dns: Added a `virtual` endpoint for querying the assigned virtual IP for a service. [[GH-11725](https://github.com/hashicorp/consul/issues/11725)] +* http: when a URL path is not found, include a message with the 404 status code to help the user understand why (e.g., HTTP API endpoint path not prefixed with /v1/) [[GH-11818](https://github.com/hashicorp/consul/issues/11818)] +* raft: Added a configuration to disable boltdb freelist syncing [[GH-11720](https://github.com/hashicorp/consul/issues/11720)] +* raft: Emit boltdb related performance metrics [[GH-11720](https://github.com/hashicorp/consul/issues/11720)] +* raft: Use bbolt instead of the legacy boltdb implementation [[GH-11720](https://github.com/hashicorp/consul/issues/11720)] +* sdk: Add support for iptable rules that allow DNS lookup redirection to Consul DNS. [[GH-11480](https://github.com/hashicorp/consul/issues/11480)] +* segments: **(Enterprise only)** ensure that the serf_lan_allowed_cidrs applies to network segments [[GH-11495](https://github.com/hashicorp/consul/issues/11495)] +* telemetry: add a new `agent.tls.cert.expiry` metric for tracking when the Agent TLS certificate expires. [[GH-10768](https://github.com/hashicorp/consul/issues/10768)] +* telemetry: add a new `mesh.active-root-ca.expiry` metric for tracking when the root certificate expires. [[GH-9924](https://github.com/hashicorp/consul/issues/9924)] +* types: add TLSVersion and TLSCipherSuite [[GH-11645](https://github.com/hashicorp/consul/issues/11645)] +* ui: Add upstream icons for upstreams and upstream instances [[GH-11556](https://github.com/hashicorp/consul/issues/11556)] * ui: Add uri guard to prevent future URL encoding issues [[GH-11117](https://github.com/hashicorp/consul/issues/11117)] * ui: Move the majority of our SASS variables to use native CSS custom properties [[GH-11200](https://github.com/hashicorp/consul/issues/11200)] * ui: Removed informational panel from the namespace selector menu when editing namespaces [[GH-11130](https://github.com/hashicorp/consul/issues/11130)] - -BUG FIXES: - -* acl: **(Enterprise only)** Fix bug in 'consul members' filtering with partitions. [[GH-11263](https://github.com/hashicorp/consul/issues/11263)] -* acl: **(Enterprise only)** ensure that auth methods with namespace rules work with partitions [[GH-11323](https://github.com/hashicorp/consul/issues/11323)] -* acl: fixes the fallback behaviour of down_policy with setting extend-cache/async-cache when the token is not cached. [[GH-11136](https://github.com/hashicorp/consul/issues/11136)] -* connect: Fix upstream listener escape hatch for prepared queries [[GH-11109](https://github.com/hashicorp/consul/issues/11109)] -* grpc: strip local ACL tokens from RPCs during forwarding if crossing datacenters [[GH-11099](https://github.com/hashicorp/consul/issues/11099)] -* server: **(Enterprise only)** Ensure that servers leave network segments when leaving other gossip pools -* telemetry: Consul Clients no longer emit Autopilot metrics. [[GH-11241](https://github.com/hashicorp/consul/issues/11241)] -* telemetry: fixes a bug with Prometheus consul_autopilot_healthy metric where 0 is reported instead of NaN on servers. [[GH-11231](https://github.com/hashicorp/consul/issues/11231)] -* ui: **(Enterprise Only)** Fix saving intentions with namespaced source/destination [[GH-11095](https://github.com/hashicorp/consul/issues/11095)] -* ui: Don't show a CRD warning for read-only intentions [[GH-11149](https://github.com/hashicorp/consul/issues/11149)] -* ui: Ensure all types of data get reconciled with the backend data [[GH-11237](https://github.com/hashicorp/consul/issues/11237)] -* ui: Fixed styling of Role remove dialog on the Token edit page [[GH-11298](https://github.com/hashicorp/consul/issues/11298)] -* ui: Gracefully recover from non-existant DC errors [[GH-11077](https://github.com/hashicorp/consul/issues/11077)] -* ui: Ignore reported permissions for KV area meaning the KV is always enabled -for both read/write access if the HTTP API allows. [[GH-10916](https://github.com/hashicorp/consul/issues/10916)] -* ui: Topology - Fix up Default Allow and Permissive Intentions notices [[GH-11216](https://github.com/hashicorp/consul/issues/11216)] -* ui: hide create button for policies/roles/namespace if users token has no write permissions to those areas [[GH-10914](https://github.com/hashicorp/consul/issues/10914)] -* xds: ensure the active streams counters are 64 bit aligned on 32 bit systems [[GH-11085](https://github.com/hashicorp/consul/issues/11085)] -* xds: fixed a bug where Envoy sidecars could enter a state where they failed to receive xds updates from Consul [[GH-10987](https://github.com/hashicorp/consul/issues/10987)] -* Fixing SOA record to return proper domain when alt domain in use. [[GH-10431]](https://github.com/hashicorp/consul/pull/10431) - -## 1.11.0-alpha (September 16, 2021) - -SECURITY: - -* rpc: authorize raft requests [CVE-2021-37219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37219) [[GH-10925](https://github.com/hashicorp/consul/issues/10925)] - -FEATURES: - -* config: add agent config flag for enterprise clients to indicate they wish to join a particular partition [[GH-10572](https://github.com/hashicorp/consul/issues/10572)] -* connect: include optional partition prefixes in SPIFFE identifiers [[GH-10507](https://github.com/hashicorp/consul/issues/10507)] -* partitions: **(Enterprise only)** Adds admin partitions, a new feature to enhance Consul's multitenancy capabilites. -* ui: Add UI support to use Vault as an external source for a service [[GH-10769](https://github.com/hashicorp/consul/issues/10769)] -* ui: Adds a copy button to each composite row in tokens list page, if Secret ID returns an actual ID [[GH-10735](https://github.com/hashicorp/consul/issues/10735)] - -IMPROVEMENTS: - -* acl: replication routine to report the last error message. [[GH-10612](https://github.com/hashicorp/consul/issues/10612)] -* api: Enable setting query options on agent health and maintenance endpoints. [[GH-10691](https://github.com/hashicorp/consul/issues/10691)] -* checks: add failures_before_warning setting for interval checks. [[GH-10969](https://github.com/hashicorp/consul/issues/10969)] -* config: **(Enterprise Only)** Allow specifying permission mode for audit logs. [[GH-10732](https://github.com/hashicorp/consul/issues/10732)] -* config: add `dns_config.recursor_strategy` flag to control the order which DNS recursors are queried [[GH-10611](https://github.com/hashicorp/consul/issues/10611)] -* connect/ca: cease including the common name field in generated x509 non-CA certificates [[GH-10424](https://github.com/hashicorp/consul/issues/10424)] -* connect: Support manipulating HTTP headers in the mesh. [[GH-10613](https://github.com/hashicorp/consul/issues/10613)] -* connect: update supported envoy versions to 1.18.4, 1.17.4, 1.16.5 [[GH-10961](https://github.com/hashicorp/consul/issues/10961)] -* debug: Add a new /v1/agent/metrics/stream API endpoint for streaming of metrics [[GH-10399](https://github.com/hashicorp/consul/issues/10399)] -* debug: rename cluster capture target to members, to be more consistent with the terms used by the API. [[GH-10804](https://github.com/hashicorp/consul/issues/10804)] -* structs: prohibit config entries from referencing more than one partition at a time [[GH-10478](https://github.com/hashicorp/consul/issues/10478)] -* telemetry: add a new `agent.tls.cert.expiry` metric for tracking when the Agent TLS certificate expires. [[GH-10768](https://github.com/hashicorp/consul/issues/10768)] -* telemetry: add a new `mesh.active-root-ca.expiry` metric for tracking when the root certificate expires. [[GH-9924](https://github.com/hashicorp/consul/issues/9924)] +* ui: Update UI browser support to 'roughly ~2 years back' [[GH-11505](https://github.com/hashicorp/consul/issues/11505)] +* ui: Update global notification styling [[GH-11577](https://github.com/hashicorp/consul/issues/11577)] +* ui: added copy to clipboard button in code editor toolbars [[GH-11474](https://github.com/hashicorp/consul/issues/11474)] DEPRECATIONS: -* config: the `ports.grpc` and `addresses.grpc` configuration settings have been renamed to `ports.xds` and `addresses.xds` to better match their function. [[GH-10588](https://github.com/hashicorp/consul/issues/10588)] +* api: `/v1/agent/token/agent_master` is deprecated and will be removed in a future major release - use `/v1/agent/token/agent_recovery` instead [[GH-11669](https://github.com/hashicorp/consul/issues/11669)] +* config: `acl.tokens.master` has been renamed to `acl.tokens.initial_management`, and `acl.tokens.agent_master` has been renamed to `acl.tokens.agent_recovery` - the old field names are now deprecated and will be removed in a future major release [[GH-11665](https://github.com/hashicorp/consul/issues/11665)] +* tls: With the upgrade to Go 1.17, the ordering of `tls_cipher_suites` will no longer be honored, and `tls_prefer_server_cipher_suites` is now ignored. [[GH-11364](https://github.com/hashicorp/consul/issues/11364)] BUG FIXES: +* acl: **(Enterprise only)** fix namespace and namespace_prefix policy evaluation when both govern an authz request * api: Fix default values used for optional fields in autopilot configuration update (POST to `/v1/operator/autopilot/configuration`) [[GH-10558](https://github.com/hashicorp/consul/issues/10558)] [[GH-10559](https://github.com/hashicorp/consul/issues/10559)] -* api: Revert early out errors from license APIs to allow v1.10+ clients to -manage licenses on older servers [[GH-10952](https://github.com/hashicorp/consul/issues/10952)] +* api: ensure new partition fields are omit empty for compatibility with older versions of consul [[GH-11585](https://github.com/hashicorp/consul/issues/11585)] +* areas: **(Enterprise Only)** Fixes a bug when using Yamux pool ( for servers version 1.7.3 and later), the entire pool was locked while connecting to a remote location, which could potentially take a long time. +* areas: **(Enterprise only)** make the gRPC server tracker network area aware [[GH-11748](https://github.com/hashicorp/consul/issues/11748)] +* ca: fixes a bug that caused non blocking leaf cert queries to return the same cached response regardless of ca rotation or leaf cert expiry [[GH-11693](https://github.com/hashicorp/consul/issues/11693)] +* ca: fixes a bug that caused the SigningKeyID to be wrong in the primary DC, when the Vault provider is used, after a CA config creates a new root. [[GH-11672](https://github.com/hashicorp/consul/issues/11672)] +* ca: fixes a bug that caused the intermediate cert used to sign leaf certs to be missing from the /connect/ca/roots API response when the Vault provider was used. [[GH-11671](https://github.com/hashicorp/consul/issues/11671)] * check root and intermediate CA expiry before using it to sign a leaf certificate. [[GH-10500](https://github.com/hashicorp/consul/issues/10500)] * connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots [[GH-10330](https://github.com/hashicorp/consul/issues/10330)] * connect/ca: require new vault mount points when updating the key type/bits for the vault connect CA provider [[GH-10331](https://github.com/hashicorp/consul/issues/10331)] +* connect: fix race causing xDS generation to lock up when discovery chains are tracked for services that are no longer upstreams. [[GH-11826](https://github.com/hashicorp/consul/issues/11826)] +* dns: Fixed an issue where on DNS requests made with .alt_domain response was returned as .domain [[GH-11348](https://github.com/hashicorp/consul/issues/11348)] * dns: return an empty answer when asked for an addr dns with type other then A and AAAA. [[GH-10401](https://github.com/hashicorp/consul/issues/10401)] -* tls: consider presented intermediates during server connection tls handshake. [[GH-10964](https://github.com/hashicorp/consul/issues/10964)] -* use the MaxQueryTime instead of RPCHoldTimeout for blocking RPC queries +* macos: fixes building with a non-Apple LLVM (such as installed via Homebrew) [[GH-11586](https://github.com/hashicorp/consul/issues/11586)] +* namespaces: **(Enterprise only)** ensure the namespace replicator doesn't replicate deleted namespaces +* proxycfg: ensure all of the watches are canceled if they are cancelable [[GH-11824](https://github.com/hashicorp/consul/issues/11824)] +* snapshot: **(Enterprise only)** fixed a bug where the snapshot agent would ignore the `license_path` setting in config files +* ui: Ensure all types of data get reconciled with the backend data [[GH-11237](https://github.com/hashicorp/consul/issues/11237)] +* ui: Ensure dc selector correctly shows the currently selected dc [[GH-11380](https://github.com/hashicorp/consul/issues/11380)] +* ui: Ensure we check intention permissions for specific services when deciding +whether to show action buttons for per service intention actions [[GH-11409](https://github.com/hashicorp/consul/issues/11409)] +* ui: Ensure we filter tokens by policy when showing which tokens use a certain +policy whilst editing a policy [[GH-11311](https://github.com/hashicorp/consul/issues/11311)] +* ui: Ensure we show a readonly designed page for readonly intentions [[GH-11767](https://github.com/hashicorp/consul/issues/11767)] +* ui: Filter the global intentions list by the currently selected parition rather +than a wildcard [[GH-11475](https://github.com/hashicorp/consul/issues/11475)] +* ui: Fix inline-code brand styling [[GH-11578](https://github.com/hashicorp/consul/issues/11578)] +* ui: Fix visual issue with slight table header overflow [[GH-11670](https://github.com/hashicorp/consul/issues/11670)] +* ui: Fixes an issue where under some circumstances after logging we present the +data loaded previous to you logging in. [[GH-11681](https://github.com/hashicorp/consul/issues/11681)] +* ui: Gracefully recover from non-existant DC errors [[GH-11077](https://github.com/hashicorp/consul/issues/11077)] +* ui: Include `Service.Namespace` into available variables for `dashboard_url_templates` [[GH-11640](https://github.com/hashicorp/consul/issues/11640)] +* ui: Revert to depending on the backend, 'post-user-action', to report +permissions errors rather than using UI capabilities 'pre-user-action' [[GH-11520](https://github.com/hashicorp/consul/issues/11520)] +* ui: Topology - Fix up Default Allow and Permissive Intentions notices [[GH-11216](https://github.com/hashicorp/consul/issues/11216)] +* ui: code editor styling (layout consistency + wide screen support) [[GH-11474](https://github.com/hashicorp/consul/issues/11474)] +* use the MaxQueryTime instead of RPCHoldTimeout for blocking RPC queries [[GH-8978](https://github.com/hashicorp/consul/pull/8978)]. [[GH-10299](https://github.com/hashicorp/consul/issues/10299)] +* windows: fixes arm and arm64 builds [[GH-11586](https://github.com/hashicorp/consul/issues/11586)] + +NOTES: + +* Renamed the `agent_master` field to `agent_recovery` in the `acl-tokens.json` file in which tokens are persisted on-disk (when `acl.enable_token_persistence` is enabled) [[GH-11744](https://github.com/hashicorp/consul/issues/11744)] ## 1.10.4 (November 11, 2021)