mirror of
https://github.com/status-im/consul.git
synced 2025-02-16 15:47:21 +00:00
update CHANGELOG after rebasing release/1.8.x after 1.8.0-beta2
This commit is contained in:
parent
6f1c72c8c3
commit
4bf72bbdf0
20
CHANGELOG.md
20
CHANGELOG.md
@ -1,5 +1,14 @@
|
|||||||
## UNRELEASED
|
## UNRELEASED
|
||||||
|
|
||||||
|
FEATURES:
|
||||||
|
|
||||||
|
* agent: handle re-bootstrapping in a secondary datacenter when WAN federation via mesh gateways is configured [[GH-7931](https://github.com/hashicorp/consul/issues/7931)]
|
||||||
|
|
||||||
|
BUGFIXES:
|
||||||
|
|
||||||
|
* connect: ensure proxy-defaults protocol is used for upstreams [[GH-7938](https://github.com/hashicorp/consul/issues/7938)]
|
||||||
|
* xds: Fixed bug where deleting a gateway config entry did not correctly remove xDS configuration from the envoy proxy [[GH-7898](https://github.com/hashicorp/consul/pull/7898)]
|
||||||
|
|
||||||
## 1.8.0-beta2 (May 21, 2020)
|
## 1.8.0-beta2 (May 21, 2020)
|
||||||
|
|
||||||
IMPROVEMENTS:
|
IMPROVEMENTS:
|
||||||
@ -19,17 +28,6 @@ BUGFIXES:
|
|||||||
|
|
||||||
FEATURES:
|
FEATURES:
|
||||||
|
|
||||||
* agent: handle re-bootstrapping in a secondary datacenter when WAN federation via mesh gateways is configured [[GH-7931](https://github.com/hashicorp/consul/issues/7931)]
|
|
||||||
|
|
||||||
BUGFIXES:
|
|
||||||
|
|
||||||
* connect: ensure proxy-defaults protocol is used for upstreams [[GH-7938](https://github.com/hashicorp/consul/issues/7938)]
|
|
||||||
* xds: Fixed bug where deleting a gateway config entry did not correctly remove xDS configuration from the envoy proxy [[GH-7898](https://github.com/hashicorp/consul/pull/7898)]
|
|
||||||
|
|
||||||
## 1.8.0-beta1 (May 14, 2020)
|
|
||||||
|
|
||||||
FEATURES:
|
|
||||||
|
|
||||||
* **Terminating Gateway**: Envoy can now be run as a gateway to enable services in a Consul service mesh to connect to external services through their local proxy. Terminating gateways unlock several of the benefits of a service mesh in the cases where a sidecar proxy cannot be deployed alongside services such as legacy applications or managed cloud databases.
|
* **Terminating Gateway**: Envoy can now be run as a gateway to enable services in a Consul service mesh to connect to external services through their local proxy. Terminating gateways unlock several of the benefits of a service mesh in the cases where a sidecar proxy cannot be deployed alongside services such as legacy applications or managed cloud databases.
|
||||||
* **Ingress Gateway**: Envoy can now be run as a gateway to ingress traffic into the Consul service mesh, enabling a more incremental transition for applications.
|
* **Ingress Gateway**: Envoy can now be run as a gateway to ingress traffic into the Consul service mesh, enabling a more incremental transition for applications.
|
||||||
* **WAN Federation over Mesh Gateways**: Allows Consul datacenters to federate by forwarding WAN gossip and RPC traffic through Mesh Gateways rather than requiring the servers to be exposed to the WAN directly.
|
* **WAN Federation over Mesh Gateways**: Allows Consul datacenters to federate by forwarding WAN gossip and RPC traffic through Mesh Gateways rather than requiring the servers to be exposed to the WAN directly.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user