Skip to content

Upgrade go version to 1.23 #22204

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Mar 6, 2025
Merged

Conversation

abhishek-hashicorp
Copy link
Contributor

@abhishek-hashicorp abhishek-hashicorp commented Mar 6, 2025

Description

Upgrade go version to 1.23
Upgrade golangci-lint version to 1.61.0

Testing & Reproduction steps

Links

PR Checklist

  • updated test coverage
  • external facing docs updated
  • appropriate backport labels added
  • not a security concern

@abhishek-hashicorp abhishek-hashicorp requested a review from a team as a code owner March 6, 2025 05:57
@github-actions github-actions bot added the pr/dependencies PR specifically updates dependencies of project label Mar 6, 2025
@abhishek-hashicorp abhishek-hashicorp added the backport/all Apply backports for all active releases per .release/versions.hcl label Mar 6, 2025
@abhishek-hashicorp abhishek-hashicorp mentioned this pull request Mar 6, 2025
4 tasks
Copy link
Contributor

@nitin-sachdev-29 nitin-sachdev-29 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@abhishek-hashicorp abhishek-hashicorp merged commit 0e77b55 into main Mar 6, 2025
92 of 94 checks passed
@abhishek-hashicorp abhishek-hashicorp deleted the abhishek/upgrade-go-1-23 branch March 6, 2025 06:47
@hc-github-team-consul-core hc-github-team-consul-core added backport/1.20 Changes are backported to 1.20 backport/1.21 Changes are backported to 1.21 backport/ent/1.15 Changes are backported to 1.15 ent backport/ent/1.18 Changes are backported to 1.18 ent backport/ent/1.19 Changes are backported to 1.19 ent labels Mar 6, 2025
@abhishek-hashicorp abhishek-hashicorp removed the backport/ent/1.15 Changes are backported to 1.15 ent label Mar 6, 2025
@hc-github-team-consul-core
Copy link
Collaborator

📣 Hi @abhishek-hashicorp! a backport is missing for this PR [22204] for versions [1.19] please perform the backport manually and add the following snippet to your backport PR description:

<details>
	<summary> Overview of commits </summary>
		- <<backport commit 1>>
		- <<backport commit 2>>
		...
</details>

Vikramarjuna added a commit that referenced this pull request May 12, 2025
* ci: fix CI skip script hole (#21741)

In some environments, the script will not fail despite SKIP_CHECK_BRANCH
being unset, leading to the script explicitly skipping CI when it should
fail fast.

Prevent this by explicitly checking for the env var.

* Initialize 1.20 Release (#21746)

* init release branch

* init 1.20 nightly tests

* drop 1.17 nightly tests for new release cycle

* drop 1.17 from test matrix

* Update nightly-test-integrations-1.20.x.yml

* ci: update the security-scanner gha token (#21748)

* ci: fix versions.hcl parsing by removing extraneous comma (#21752)

Commas are not expected after HCL blocks. This is causing parsing in BPA
to fail and may interfere w/ other release-related workflows.

* Upgrade ubi image to 9.4 (#21750)

* upgrade go to 1.23.1, upgrade ubi image to 9.4

* add changelog

* revert go version upgrade

* Update test-integrations.yml to capture latest versions of Nomad and Vault (#21749)

* Update test-integrations.yml

Update Vault/Nomad versions to ensure we're testing the latest versions .

* Update test to test latest available CE versions

* Adds initial sg documentation for the health API  (#21763)

Adds initial sg documentation

* CE-654 - TLS Encryption docs + CE-713 - Gossip Encryption key rotation (#21509)

* New proposed structure

* Fix structure and add some content

* Fix structure and add some content

* Fix structure and add some content

* Add content

* Add content

* mtls steps

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* Encryption docs structure change

* spacing fixes

* Replace <CodeTabs>

* <CodeBlockConfig> alignment

* indent fixes

* spacing

* More Code tabs fixes

* Structure chenges

* Structure chenges

* Extra content and CE-713 migration

* Extra content

* Extra content

* Extra content

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Apply suggestions from code review

* Test CodeTabs

* Test CodeTabs

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: boruszak <jeffrey.boruszak@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* fix spacing of bash scripts (#21760)

* fix spacing of bash scripts

* shellcheck all the things

* cat filename rather than concatenating pr number

* Stage rc release (#21770)

stage rc release

* chore: Update VERSION for next major release (#21756)

This should be set to the next major version now that `release/1.20.x` has been created.

* Update raft to 1.7.0 and add configuration for prevote (#21758)

* update raft to 1.7.0

* add config to disable raft prevote

* add changelog

* api: remove dependency on proto-public, protobuf, and grpc (#21780)

* [NET-11150] ci: fix conditional skip and add safeguard (#21781)

ci: fix conditional skip and add safeguard

Adopt a third-party action to avoid script bugs, and to fix a current
issue where the script fails to detect all changes when processing push
events on PR branches.

Adapted from hashicorp/consul-dataplane#637. See that PR for testing
details and background context.

* Fix changelog for 1.20-rc1 (#21776)

fix changelog

* Add partition field for catalog deregister docs (#21788)

* Add partition field for catalog deregister docs

* Update website/content/api-docs/catalog.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* update serf links (#21797)

* update serf links

* add .markdown file extension

* update serf links to use /blob/master/

* fix broken links

---------

Co-authored-by: github-team-consul-core <github-team-consul-core@hashicorp.com>

* docs: Add missing `&&` in DNS forwading tutorial (#21804)

Add missing `&&` to iptables command.

The original commands fail when being directly pasted into a shell.

* Adds grafana dashboards (#21806)

* Upgrade test improvements for 1.20.x (#21813)

* Bump Envoy version used for 1.20.x upgrade tests

* Improve README + docstrings

* Update ENVOY_VERSIONS (#21820)

No new minor versions, just incrementing the patches for hygiene's sake

* ci: ensure int test docker pull goes through proxy (#21819)

* docs: Consul DNS views on Kubernetes (#21802)

* Backport of ci: update the security-scanner gha token into release/1.20.x (#21754)

backport of commit eb9dbc9

Co-authored-by: dduzgun-security <deniz.duzgun@hashicorp.com>

* Backport of Initialize 1.20 Release into release/1.20.x (#21753)

* backport of commit a33e903

* backport of commit 37163dc

* backport of commit 38f0907

* backport of commit 6ab7ec2

* backport of commit 7ac4178

* backport of commit 5dfebb2

* backport of commit 316d68c

---------

Co-authored-by: Sarah Alsmiller <sarah.alsmiller@hashicorp.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>

* Backport of Stage rc release into release/1.20.x (#21772)

backport of commit d311f2b

Co-authored-by: Sarah Alsmiller <sarah.alsmiller@hashicorp.com>

* Backport of Upgrade ubi image to 9.4 into release/1.20.x (#21773)

* backport of commit 888e302

* backport of commit 17499dc

* backport of commit d933d37

---------

Co-authored-by: Dhia Ayachi <dhia.ayachi@gmail.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>

* Backport of security: update alpine base image to 3.20 into release/1.20.x (#21774)

* backport of commit 4421ce1

* Upgrade ubi image to 9.4 (#21750)

---------

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: Sarah Alsmiller <sarah.alsmiller@hashicorp.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>

* Backport of fix spacing of bash scripts into release/1.20.x (#21769)

* backport of commit 1e97297

* backport of commit b7053f5

* backport of commit a391f2f

---------

Co-authored-by: jm96441n <john.maguire@hashicorp.com>

* Backport of [NET-11150] ci: fix conditional skip and add safeguard into release/1.20.x (#21783)

backport of commit c3db6c9

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>

* initial commit

* Initial pages

* Edits to other pages + nav & redirects

* minor fixes

* Backport of security: update alpine base image to 3.20 into release/1.20.x (#21774)

* backport of commit 4421ce1

* Upgrade ubi image to 9.4 (#21750)

---------

Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: Sarah Alsmiller <sarah.alsmiller@hashicorp.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>

* CE-679

* align with main

* Content updates

* minor edit

* Apply suggestions from code review

Co-authored-by: Aimee Ukasick <aimee.ukasick@hashicorp.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* CoreDNS config update

* small edits

* typo fix

---------

Co-authored-by: hc-github-team-consul-core <github-team-consul-core@hashicorp.com>
Co-authored-by: dduzgun-security <deniz.duzgun@hashicorp.com>
Co-authored-by: Sarah Alsmiller <sarah.alsmiller@hashicorp.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>
Co-authored-by: Dhia Ayachi <dhia.ayachi@gmail.com>
Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: jm96441n <john.maguire@hashicorp.com>
Co-authored-by: Aimee Ukasick <aimee.ukasick@hashicorp.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Post-release updates for 1.20.0 (#21829)

* Update active version list in .release/versions.hcl

* Remove nightly tests for 1.17.x

* Add nightly tests for 1.20.x

* Gate nightly tests for 1.19.x to Enterprise only

* Update CHANGELOG.md

* docs: Consul v1.20 release notes (#21826)

* Page creation

* DNS views description

* Catalog sync and openshift

* Grafana + consul-k8s release notes

* nav update

* Fix known issues language

* chore: remove unintentionally committed consul-k8s submodule (#21833)

Also prevent future re-commits of this submodule path by adding to
.gitignore.

* [NET-1151 NET-11228] security: Add request normalization and header match options to prevent L7 intentions bypass (#21816)

mesh: add options for HTTP incoming request normalization

Expose global mesh configuration to enforce inbound HTTP request
normalization on mesh traffic via Envoy xDS config.

mesh: enable inbound URL path normalization by default

mesh: add support for L7 header match contains and ignore_case

Enable partial string and case-insensitive matching in L7 intentions
header match rules.

ui: support L7 header match contains and ignore_case

Co-authored-by: Phil Renaud <phil@riotindustries.com>

test: add request normalization integration bats tests

Add both "positive" and "negative" test suites, showing normalization in
action as well as expected results when it is not enabled, for the same
set of test cases.

Also add some alternative service container test helpers for verifying
raw HTTP request paths, which is difficult to do with Fortio.

docs: update security and reference docs for L7 intentions bypass prevention

- Update security docs with best practices for service intentions
  configuration
- Update configuration entry references for mesh and intentions to
  reflect new values and add guidance on usage

* Suppress CVE-2024-9143 (#21848)

Update security-scan.hcl

* docs: clarify Envoy and dataplane LTS support policy (#21337)

Update matrices and clarify statements as to when Consul expands
support to new major versions of Envoy and Consul dataplane in light of
Consul LTS or Envoy EOL status.

* Update compatibility matrix to include 1.20.x (#21843)

* Update compatibility matrix to include 1.20.x

* Update compatibility.mdx

* Update Envoy compatibility matrices to include consul 1.20.x and dataplane 1.6.x (#21852)

* Update Envoy compatibility matrices to include consul 1.20.x and dataplane 1.6.x

* Remove non-LTS version from LTS table

* Fix incorrect version in dataplane release matrix

* Remove releases that don't span versions from the matrix of releases that span versions

* Upgrade envoy version in nightly integration tests (#21864)

Update nightly-test-integrations.yml

* chore: retain retracted api submodule version (#21861)

* [NET-1151 NET-11046] docs: clarify request normalization and L7 headers feature availability (#21855)

docs: clarify request normalization and L7 headers feature availability

- Add notes on feature availability tied to specific fix versions
- Add missing 1.20 upgrade entry
- Remove erroneous 1.17 upgrade entry (version DNE)
- Add missing HCL variant for service intentions config

* Allow multiple endpoints in Envoy clusters configured with hostnames (#21655)

* xds: allow multiple endpoints for strict_dns

* xds: fixes typo in multi hostname warning

* docs: add missing slash in redirect (#21881)

missing slash

* Update changelog (#21896)

* ci(security-scanner): add support for Red Hat UBI images and fix typo (#21912)

* ci(security-scanner): add support for Red Hat UBI images and fix typo

* hclfmt

* clean-up comments

Co-authored-by: Kent Gruber <kent@hashicorp.com>

---------

Co-authored-by: Kent Gruber <kent@hashicorp.com>

* Docs/CE-749-remove-references-from-consul (#21914)

* delete HCP Consul Central references

* Path correction

* missed listing

* Nav update

* Added the docs for all the grafana dashboards. (#21795)

* Added the docs for all the grafana dashboards.

 Author:   Yasmin Lorin Kaygalak <ykaygala@villanova.edu>

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* v2: remove HCP Link integration (#21883)

Also prevent de-registered retired v2 types from being restored from a
snapshot, such as these hcp resources. Without doing this, anyone with
any of these types in their state store will retain them forever with no
avenue to remove them.

* [Security] Secvuln 8633 Consul configuration allowed repeated keys (#21908)

* upgrade hcl package and account for possiblity of duplicates existing already in the cache

* upgrade to new tag

* add defensive line to prevent potential forever loop

* o mod tidy and changelog

* Update acl/policy.go

* fix raft reversion

* go mod tidy

* fix test

* remove duplicate key in test

* remove duplicates from test cases

* clean up

* go mod tidy

* go mod tidy

* pull in new hcl tag

* Update CODEOWNER (#21947)

* update code owners

* Update JWT to resolve CVE-2024-51744 (#21951)

* update jwt package

* add changelog

* Fix PeerUpstreamEndpoints and UpstreamPeerTrustBundles to only Cancel watch when needed, otherwise keep the watch active (#21871)

* fix to only reset peering watches when no other target need watching

* remove unused logger

* add changelog

* Update .changelog/21871.txt

Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>

---------

Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>

* NET-11737 - sec vulnerability - remediate ability to use bexpr to filter results without ACL read on endpoint (#21950)

* NET-11737 - sec vulnerability - remediate ability to use bexpr to filter results without ACL read on endpoint

* add changelog

* update test descriptions to make more sense

* Update API Group under backendRefs  (#21961)

* Update routes.mdx

Currently backendRefs refers to api-gateway.consul.hashicorp.com as the API Group that should be used when kind is set to Mesh Service. Based on mesh service template, it should just be consul.hashicorp.com.

* Update backendRefs in route to peered doc

* state: ensure that identical manual virtual IP updates result in not bumping the modify indexes (#21909)

The consul-k8s endpoints controller issues catalog register and manual virtual ip
updates without first checking to see if the updates would be effectively not
changing anything. This is supposed to be reasonable because the state store
functions do the check for a no-op update and should discard repeat updates so
that downstream blocking queries watching one of the resources don't fire
pointlessly (and CPU wastefully).

While this is true for the check/service/node catalog updates, it is not true for
the "manual virtual ip" updates triggered by the PUT /v1/internal/service-virtual-ip.
Forcing the connect injector pod to recycle while watching some lightly
modified FSM code can show that a lot of updates are of the update list of ips
from [A] to [A]. Immediately following this stray update you can see a lot of
activity in proxycfg and xds packages waking up due to blocking queries
triggered by this.

This PR skips updates that change nothing both:

- at the RPC layer before passing it to raft (ideally)
- if the write does make it through raft and get applied to the FSM (failsafe)

* Add alpine image cves to suppress list (#21964)

add alpine image cves to suppress list

* [Security] SECVULN-8621: Fix XSS Vulnerability where content-type header wasn't explicitly set in API requests (#21930)

* Fix XSS Vulnerability where content-type header wasn't explicitly set in API requests

* fix failing unit test

* docs: fix broken link (#21971)

* [Security] Bump envoy versions (#22002)

bump envoy versions

* [Security] Bump crypto libraries (#22001)

* update crypto libraries

* update crypto libraries

* add changelog, suppress vulnerability that hasn't been fixed yet

* Bump alpine image (#22009)

bump alpine image

* Update UBI Image  (#22011)

* update image

* change log

* Suppress redhat linux CVEs (#22015)

suppress redhat linux CVEs

* Bump golang.org/x/crypto from 0.22.0 to 0.31.0 in /testing/deployer (#22008)

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.22.0 to 0.31.0.
- [Commits](golang/crypto@v0.22.0...v0.31.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* chore: remove staff codeowners now that it requires mandatory review (#22020)

* [Security] Bump net packages to resolve GO-2024-3333 (#22021)

* bump net packages

* add changelog

* sec: bump envoy patch versions (#22024)

* Added labels for redhat validation (#22047)

Update Dockerfile

* NET-11798: Set APIGateway TLSConfig if unset or empty (#21984)

* NET-11798: Set APIGateway TLSConfig if unset or empty

* add changelog

* update golden file tests

* add missing golden files

* Update .changelog/21984.txt

Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>

* remove use of reflect library and check if object is empty instead

---------

Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>

* sec: bump go and deps versions (#22084)

* security: bump go and deps versions

* add changelog

* fix go toolchained version

* update changelog message

* chore: Updated the changelogs for 1.20.2, 1.19.4, 1.18.6, 1.15.16 (#22093)

Updated the changelog

* Let education and web presence merge PRs to website directory files. (#21991)

* add consul education and web presence ability to merge PRs to relavent website directory files

* change edu approvers to consul-docs

* let education also edit the docs side navigation

* fix spacing and punctuation

* one more try to fix spacing

* Consume latest version of consul-awsauth dependency (#22109)

* Consume latest version of consul-awsauth dependency

* Add changelog entry

* metadata: memoize the parsed build versions (#22113)

There will only be a small set of consul build versions that a single consul
server will witness. Inside of metadata.IsConsulServer we use a very
expensive function in the hashicorp/go-version library to parse these into
read-only *version.Version structs all over Consul.

Memoize these in a package cache map. Likely the thing will only have like
2 keys in it ever over the life of the process.

* chore: Update changelog for patch releases (#22128)

update changelog for patch releases

* security: Upgrade go version to 1.22.12 (#22132)

* security: Upgrade go version to 1.22.12

* Added changelog

* Fix lint issues

* Update golangci-lint to 1.56.1 (#22134)

* fix logging time arch and os (#22120)

* fix logging time arch and os

* fix logging time for bsd

* added changelog entry

* added changelog file

---------

Co-authored-by: nitin-sachdev-29 <nitin.sachdev@hashicorp.com>

* chore: Update supported Envoy versions in ENVOY_VERSIONS file (#22138)

* chore: Update supported Envoy versions in ENVOY_VERSIONS file

* added changelog file

---------

Co-authored-by: Abhishek Sahu <abhishek.sahu@hashicorp.com>

* Changed log level for retryable error Scenarios (#22141)

* Changed log level :
    1- xDS DeltaDiscoveryRequest context cancelled set to INFO on stream cancelled as it is retrieable
    2- subscription failed logging on ACL change is set to INFO as is also retriable

* Added change log file and updated code for PR comments

* fixing error logging with key, value, updating changelog

* security: Suppress redhat linux CVEs (#22147)

* chore: Update the changelog for 1.20.3, 1.19.5, 1.18.8 (#22159)

Update the changelog for 1.20.3, 1.19.5, 1.18.6

* docs: namespace ACL permissions for exported services (#22162)

* Exported services config entry page updated

* Dataplanes index update

* fix bsd time log implementation part 2 (#22170)

* fix bsd time log implementation

* split freebsd and openbsd

* retracting api submodule version 1.31.1 (#22172)

* retracting api submodule version 1.31.1

* added changelog

* fixed changelog and added comment in go.mod

* upgraded consul/api submodule to v1.31.2 (#22174)

* upgraded consul/api submodule to v1.31.2

* added changelog

* docs: namespace ACL config typo fix (#22166)

typo fix

* feature: Send SNI in RemoteJWKS over TLS  (#22177)

* update: send hostname in SNI for RemoteJWKS envoy request over TLS
* update: add sni in golden files for JWT
* add: UseSNI flag in JWT Provider Config entry
* add: testcases for SNI in JWT provider
* update: add UseSNI for JWKS in website doc

* [ui] Read from localStorage to display a copyable access token and secret (#22105)

* Read from localStorage to display a copyable access token and secret

* Error when loading handled

* logging fix for netbsd os (#22184)

* logging fix for netbsd os

* logging fix for netbsd os

* added chengelog entry

* Initialise release for consul 1.21 (#22195)

* Init release 1.21

* Create nightly-test-integrations-1.21.x.yml

* Remove comma

* Upgrade go version to 1.23 (#22204)

* Upgrade go version

* Added changelog

* Update config.deepcopy.go

* Update .golangci.yml

* fix lint

* security: Upgrade crypto, oauth, go-jose (#22207)

* Upgrade crypto to 0.35.0

* Upgrade oauth and go-jose

* upgrade oauth and jose

* Added changelog

* Add the missing Service TaggedAddresses and Check Type fields to Txn API (#22220)

* Add the missing Service TaggedAddresses and Check Type fields to Txn API

* added changelog

* [Feature] Invalidate session check if associated session is deleted (#22227)

* Add session health check management and tests

* Refactor session health check management and update related tests

* Cleanup

---------

Co-authored-by: srahul3 <rahulsharma@hashicorp.com>

* build(deps): bump go version to go1.23.7 (#22237)

* build(deps): bump go version to go1.24.1

* update: use 1.23.7 instead

* add changelog

* Fixes a couple of DNS token example commands  (#22224)

* Fixes a couple of example commands

The `-name` option is not available `-description` is used in it's place.

set-agent-token is a sub-command of the acl command.

* This feature works with federated services only

This command does not work with peered clusters so needs to be clarified.

* Refactor Txn API to use AgentService and add TaggedAddresses support (#22248)

* Add the missing Service TaggedAddresses and Check Type fields to Txn API

* added changelog

* Refactor Txn API to use AgentService and add TaggedAddresses support

* Document Azure service principal auth in snapshot/agent.mdx (#21942)

* Update agent.mdx

Starting from Consul v1.20.1+ent, Consul supports using Azure Blob Storage for the snapshot agent via Azure Service Principal  ID and Secret authentication. I've successfully tested this configuration in my lab environment and have added the relevant parameters to this documentation for completeness.

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

---------

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Fix catalog service endpoint when querying for a peer service (#22189)

* Fix catalog service endpoint when querying for a peer service

* Add changelog file

* Add changes to docs. Add test

* Update website/content/api-docs/catalog.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Sreeram Narayanan <sreeram.narayanan@hashicorp.com>
Co-authored-by: nitin-sachdev-29 <nitin.sachdev@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Update lock.mdx (Node Health Check and TTL) (#22258)

* Update lock.mdx (Node Health Check and TTL)

Consul `lock` command update that captures why consul lock can act indefinitely when node checks are in place and how users can work around it by creating/managing their own session.

* Update website/content/commands/lock.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* CVE Fix (#22268)

* Fixed following CVEs:
GHSA-vvgc-356p-c3xw in golang.org/x/net@v0.37.0
GO-2025-3595 in golang.org/x/net@v0.37.0
GO-2025-3553 in github.com/golang-jwt/jwt/v4@v4.5.1
GHSA-mh63-6h87-95cp in github.com/golang-jwt/jwt/v4@v4.5.1
stdlib in Go GO-2025-3563@1.23.7

* added changelog

* Upgraded go to 1.23.8 (#22273)

* Fixed following CVEs:
GHSA-vvgc-356p-c3xw in golang.org/x/net@v0.37.0
GO-2025-3595 in golang.org/x/net@v0.37.0
GO-2025-3553 in github.com/golang-jwt/jwt/v4@v4.5.1
GHSA-mh63-6h87-95cp in github.com/golang-jwt/jwt/v4@v4.5.1
stdlib in Go GO-2025-3563@1.23.7

* added changelog

* upgraded go to 1.23.8

* suppressing alpine CVEs as there is no fix yet (#22278)

* feature: Adding configurable value to disable XDS Load balancing

feature: Adding configurable value to disable XDS Load balancing

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* suppressing staticcheck lint warning

* backport of commit b3039bd

* backport of commit bcdde50

* backport of commit 245cbd8

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: Michael Zalimeni <michael.zalimeni@hashicorp.com>
Co-authored-by: sarahalsmiller <100602640+sarahalsmiller@users.noreply.github.com>
Co-authored-by: Deniz Onur Duzgun <59659739+dduzgun-security@users.noreply.github.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
Co-authored-by: NicoletaPopoviciu <87660255+NicoletaPopoviciu@users.noreply.github.com>
Co-authored-by: Nick Wales <588472+nickwales@users.noreply.github.com>
Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com>
Co-authored-by: boruszak <jeffrey.boruszak@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: John Maguire <john.maguire@hashicorp.com>
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
Co-authored-by: John Murret <john.murret@hashicorp.com>
Co-authored-by: Lens0021 / Leslie <lorentz0021@gmail.com>
Co-authored-by: Yasmin Lorin Kaygalak <ykaygala@villanova.edu>
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
Co-authored-by: dduzgun-security <deniz.duzgun@hashicorp.com>
Co-authored-by: Sarah Alsmiller <sarah.alsmiller@hashicorp.com>
Co-authored-by: Dhia Ayachi <dhia.ayachi@gmail.com>
Co-authored-by: Aimee Ukasick <aimee.ukasick@hashicorp.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Tom Davies <tom@t-davies.com>
Co-authored-by: Kent Gruber <kent@hashicorp.com>
Co-authored-by: Yasmin Lorin Kaygalak <lorin.kaygalak@hashicorp.com>
Co-authored-by: xwa153 <xinyi.wang@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Mark Campbell-Vincent <mnmvincent@gmail.com>
Co-authored-by: Anita Akaeze <anita.akaeze@hashicorp.com>
Co-authored-by: Bhautik <bhautikrchudasama@gmail.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Abhishek Sahu <abhishek.sahu@hashicorp.com>
Co-authored-by: Judith Malnick <judith@hashicorp.com>
Co-authored-by: nitin-sachdev-29 <nitin.sachdev@hashicorp.com>
Co-authored-by: Mukul Anand <mukul.anand@hashicorp.com>
Co-authored-by: Sreeram Narayanan <sreeram.narayanan@hashicorp.com>
Co-authored-by: Phil Renaud <phil.renaud@hashicorp.com>
Co-authored-by: Rahul <srahul3@gmail.com>
Co-authored-by: srahul3 <rahulsharma@hashicorp.com>
Co-authored-by: SuyashHashiCorp <92308220+SuyashHashiCorp@users.noreply.github.com>
Co-authored-by: Jorge Marey <6938602+jorgemarey@users.noreply.github.com>
Co-authored-by: natemollica-dev <57850649+natemollica-nm@users.noreply.github.com>
Co-authored-by: Vikramarjuna <vkrmrjun@gmail.com>
boruszak added a commit that referenced this pull request May 22, 2025
* Initialise release for consul 1.21 (#22195)

* Init release 1.21

* Create nightly-test-integrations-1.21.x.yml

* Remove comma

* Upgrade go version to 1.23 (#22204)

* Upgrade go version

* Added changelog

* Update config.deepcopy.go

* Update .golangci.yml

* fix lint

* security: Upgrade crypto, oauth, go-jose (#22207)

* Upgrade crypto to 0.35.0

* Upgrade oauth and go-jose

* upgrade oauth and jose

* Added changelog

* Add the missing Service TaggedAddresses and Check Type fields to Txn API (#22220)

* Add the missing Service TaggedAddresses and Check Type fields to Txn API

* added changelog

* [Feature] Invalidate session check if associated session is deleted (#22227)

* Add session health check management and tests

* Refactor session health check management and update related tests

* Cleanup

---------

Co-authored-by: srahul3 <rahulsharma@hashicorp.com>

* build(deps): bump go version to go1.23.7 (#22237)

* build(deps): bump go version to go1.24.1

* update: use 1.23.7 instead

* add changelog

* Fixes a couple of DNS token example commands  (#22224)

* Fixes a couple of example commands

The `-name` option is not available `-description` is used in it's place.

set-agent-token is a sub-command of the acl command.

* This feature works with federated services only

This command does not work with peered clusters so needs to be clarified.

* Refactor Txn API to use AgentService and add TaggedAddresses support (#22248)

* Add the missing Service TaggedAddresses and Check Type fields to Txn API

* added changelog

* Refactor Txn API to use AgentService and add TaggedAddresses support

* Document Azure service principal auth in snapshot/agent.mdx (#21942)

* Update agent.mdx

Starting from Consul v1.20.1+ent, Consul supports using Azure Blob Storage for the snapshot agent via Azure Service Principal  ID and Secret authentication. I've successfully tested this configuration in my lab environment and have added the relevant parameters to this documentation for completeness.

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Update website/content/commands/snapshot/agent.mdx

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

---------

Co-authored-by: Blake Covarrubias <blake@covarrubi.as>

* Fix catalog service endpoint when querying for a peer service (#22189)

* Fix catalog service endpoint when querying for a peer service

* Add changelog file

* Add changes to docs. Add test

* Update website/content/api-docs/catalog.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Sreeram Narayanan <sreeram.narayanan@hashicorp.com>
Co-authored-by: nitin-sachdev-29 <nitin.sachdev@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Update lock.mdx (Node Health Check and TTL) (#22258)

* Update lock.mdx (Node Health Check and TTL)

Consul `lock` command update that captures why consul lock can act indefinitely when node checks are in place and how users can work around it by creating/managing their own session.

* Update website/content/commands/lock.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* CVE Fix (#22268)

* Fixed following CVEs:
GHSA-vvgc-356p-c3xw in golang.org/x/net@v0.37.0
GO-2025-3595 in golang.org/x/net@v0.37.0
GO-2025-3553 in github.com/golang-jwt/jwt/v4@v4.5.1
GHSA-mh63-6h87-95cp in github.com/golang-jwt/jwt/v4@v4.5.1
stdlib in Go GO-2025-3563@1.23.7

* added changelog

* Upgraded go to 1.23.8 (#22273)

* Fixed following CVEs:
GHSA-vvgc-356p-c3xw in golang.org/x/net@v0.37.0
GO-2025-3595 in golang.org/x/net@v0.37.0
GO-2025-3553 in github.com/golang-jwt/jwt/v4@v4.5.1
GHSA-mh63-6h87-95cp in github.com/golang-jwt/jwt/v4@v4.5.1
stdlib in Go GO-2025-3563@1.23.7

* added changelog

* upgraded go to 1.23.8

* suppressing alpine CVEs as there is no fix yet (#22278)

* feature: Adding configurable value to disable XDS Load balancing

feature: Adding configurable value to disable XDS Load balancing

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Go discover dependency upgrade (#22313)

* suppressing staticcheck lint warning

* upgraded hashicorp/go-discover to 1.0.0 version

* generated proto files

* Update iframe to VideoEmbed (#22302)

update iframe to videoembed

* Consul Documentation restructure according to IA & content strategy (#22041)

* migration

* nav fixes

* nav

* Missing top-level pages

* nav/content alignment

* partial path update

* Partial fixes

* Partial updates

* partial paths

* erroneous replacement fix

* 3 page migration (test)

* /agent migration

* CA, cluster peering, & config entries

* connect -> Gateways

* connect

* connect

* nav

* Dynamic app config

* ecs

* Tutorials -> docs

* Tutorials moved

* Updated nav with tutorials in docs

* enterprise, install, and k8s through k8s/connect

* k8s deployment

* finished k8s migration

* lambda, nia, nomad

* nav fixes

* security and discovery

* service & upgrade

* final page migrations

* Nav update

* Change navigation and page placement

* Revert "Change navigation and page placement"

This reverts commit 0934235.

* Change navigation and page placement

* Fixed broken include.

* Updated sync consul service catalog with aws cloud map page.

* Update to match page use of cloud map - AWS separates the two words.

* Updated register services into a namespace docs page.

* Updated explore the consul ui page.

* Refactor HAProxy tutorial into usage doc

* re-org

* architecture and fundamentals

* duplicate page deleted

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Moved consul-aws cli reference to its own page.

* partial fix

* Fix links and next steps

* install and dev mode pages

* CodeBlocks

* env var page

* title changes

* Aligning with tracker

* nav fixes

* tracking alignment

* Nav fixes

* content checker fixed

* Partial path fixes

* more partial fixes

* remove v2 reference

* nav/title adjustments

* first 64 find and replaces

* /connect and /consul-vs-other

* through /nia

* finish docs paths

* tutorial link paths

* Redirects

* Redirect updates

* another tutorials redirect fix

* link path updates

* security architecture

* Raft backend architecture

* Deploy Consul overview

* Fixes to redirect tests

* Redirects

* More redirect fixes

* Updated link path replacements

* README draft

* README

* More readme

* Readme

* Deploy server overview

* Deploy client agents and dataplanes

* cloud auto join page move

* Manage Consul

* Clean up

* Consul template structure and first content

* page name and filepath changes

* Index updates

* typo

* VMs index page

* Consul template documentation

* disaster recovery and openshift guides (#11)

* docs: disaster recovery
* docs: openshift

* adding OpenShift Local to CRC naming convention
* Openshift page restructure
* add redundancy-zones link
* update openshift guide versions

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: boruszak <jeffrey.boruszak@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* /connect

* /connect/vm

* /connect/k8s

* /fundamentals/cli

* /fundamentals/cli and /register/service/nomad

* /fundamentals/api

* /fundamentals/editions (and remove env-var)

* /fundamentals/tf and finish /fundamentals/editions

* /fundamentals/identity

* Fixes for working preview

* Fundamentals updates

* Agent page updates

* Agent reference restructure

* Redirects update

* CT config

* References with links and defaults

* Some workflow fixes

* Fix some links and images

* Gossip and TLS with vault first changes

* Gossip and TLS with vault first changes

* Replace consul.io for URL deprecation

* Bug Bash fixes

* More bug bash fixes

* nav fix

* Final bug bash fixes

* Vault TLS consul-template

* Name the tool Consul Template

* Move auto_config in config reference

* Fix links

* Updates to architecture

* Architecture and use case updates

* QoL improvements

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Glossary improvements

* Updates

* README updates

* Finetuning

* final readme updates

* Link path changes to fix 500 errors

* linkcheck fixes round 2

* round 3 500 error fixes

* Errors fixes round 4

* CE-827: adding k8s and openshift tshoot info

* Revert "CE-827: adding k8s and openshift tshoot info"

This reverts commit a02f21d.

* Redhat category rename

* Readme updates

* CE-846 content and screenshots

* Ref/agent remove index; add auto-config file

* Fix broken links due to configuration-file dir

* CE-851 content and images

* Fix content-check errors

* lock update + move autopilot

* v1.21 updates & release notes

* IA/Content strategy readme finalizations

* Inline image fix

* real img fix

* More README + consul.d in agent fundamentals

* reviewed dataplane architecture content

* review rest of completed drafts in arch

* persona/directory index

* reviewed fundamentals

* Readme toc and final updates

* re-order some sections

* Final toc for readme

* move inline examples to Example section where it made sense.

* Ce-835: DNS views (#16)

* CE-835 DNS forwarding in OpenShift

* CE-835 DNS views in OpenShift

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* CE-827: Troubleshoot OpenShift (#17)

* CE-827: adding k8s and openshift tshoot info

* CE-827: adding openshift import-image info

* CE-827: import-image timeout

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* CE-833: OpenShift page updates (#18)

* CE-833: updater versions

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* CE-825: Consul on OpenShift Index Page (#19)

* CE-825: Consul on OpenShift Index Page

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* telemetry

* configuration file index

* ESM and release notes updates

* Apply suggestions from code review

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>

* fixes for content check

* partial fix

* Merge resolution changes

* Agent: Fix remaining links to reference/agent#

* Copy edits

* Update HAProxy load balance guide

* review manage/dns

* multi-tenant/sameness-group/vm

* multi-tenant/samenessgroup/k8s

* secure

* deploy

* CE-834: Upgrade OpenShift (#25)

* upgrade openshift deployment

* openshift: improve upgrade article

* openshift: add redhat word to openshift term

* Apply suggestions from code review

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* revision after code review

---------

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>

* Cleanup, especially Agent references

* content fixes

* Error fix

---------

Co-authored-by: Daniele Carcasole <daniele@daniele-tt72xnn9y7.homenet.telecomitalia.it>
Co-authored-by: danielehc <daniele@hashicorp.com>
Co-authored-by: Anthony <russo555@gmail.com>
Co-authored-by: Krastin Krastev <krastin@hashicorp.com>
Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com>
Co-authored-by: Aimee Ukasick <aimee.ukasick@hashicorp.com>
Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>

* feature: add LUA script Envoy extension support for API gateway (#22321)

* docs: Lua page fix (#22338)

Missing <CodeBlockConfig>  added

* update: remove 1.15 as LTS, remove1.20 as CE (#22341)

* Update version compatibility matricies for v1.21.x (#22328)

* table to partial conversion plus updates

* k8s version update

---------

Co-authored-by: Abhishek Sahu <abhishek.sahu@hashicorp.com>
Co-authored-by: nitin-sachdev-29 <nitin.sachdev@hashicorp.com>
Co-authored-by: Rahul <srahul3@gmail.com>
Co-authored-by: srahul3 <rahulsharma@hashicorp.com>
Co-authored-by: Deniz Onur Duzgun <59659739+dduzgun-security@users.noreply.github.com>
Co-authored-by: Nick Wales <588472+nickwales@users.noreply.github.com>
Co-authored-by: SuyashHashiCorp <92308220+SuyashHashiCorp@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Jorge Marey <6938602+jorgemarey@users.noreply.github.com>
Co-authored-by: Sreeram Narayanan <sreeram.narayanan@hashicorp.com>
Co-authored-by: natemollica-dev <57850649+natemollica-nm@users.noreply.github.com>
Co-authored-by: Vikramarjuna <vkrmrjun@gmail.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Daniele Carcasole <daniele@daniele-tt72xnn9y7.homenet.telecomitalia.it>
Co-authored-by: danielehc <daniele@hashicorp.com>
Co-authored-by: Anthony <russo555@gmail.com>
Co-authored-by: Krastin Krastev <krastin@hashicorp.com>
Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com>
Co-authored-by: Aimee Ukasick <aimee.ukasick@hashicorp.com>
Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/all Apply backports for all active releases per .release/versions.hcl backport/ent/1.18 Changes are backported to 1.18 ent backport/ent/1.19 Changes are backported to 1.19 ent backport/1.20 Changes are backported to 1.20 backport/1.21 Changes are backported to 1.21 pr/dependencies PR specifically updates dependencies of project
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants