gloo

The Feature-rich, Kubernetes-native, Next-Generation API Gateway Built on Envoy

APACHE-2.0 License

Stars
3.9K
Committers
176

Bot releases are hidden (Show)

gloo - v1.6.0-beta4

Published by yuval-k about 4 years ago

Helm Changes

Fixes

  • Fix an issue where ssl configurations across different virtual services may be incorrectly cached if they ssl configurations only differ by ssl-parameters (e.g., min tls version). After this change, ssl configurations that are only different by ssl parameters must have different sni domains. Prior to this change, such a configuration would not error but could result in one ssl configuration being selected over another; now an explicit error is recorded on the virtual service. (https://github.com/solo-io/gloo/issues/3776)
  • Fix the validation API to return all errors encountered while validating a list of resources, rather than immediately returning on the first unmarshal error encountered for a resource in a list resource. (https://github.com/solo-io/gloo/issues/3610)
  • Fix the validation API error reporting to include the resource associated with the error returned. (https://github.com/solo-io/gloo/issues/3610)
gloo - v1.5.2

Published by kdorosh about 4 years ago

Fixes

  • Fix the validation API to only return proxies that would be generated by proposed resources if requested. This change means the default behavior matches the kubernetes validation webhook API. By including the top-level value returnProxies=true in the json/yaml request to the API, you can signal the endpoint to return the proxies that would be generated (previously, always returning by default). (https://github.com/solo-io/gloo/issues/3613)
  • Fix the validation API to return all errors encountered while validating a list of resources, rather than immediately returning on the first unmarshal error encountered for a resource in a list resource. (https://github.com/solo-io/gloo/issues/3610)
  • Fix the validation API error reporting to include the resource associated with the error returned. (https://github.com/solo-io/gloo/issues/3610)
gloo - v1.6.0-beta3

Published by kdorosh about 4 years ago

Dependency Bumps

  • envoy-gloo/solo-io has been upgraded to v1.17.0-rc1.

Helm Changes

New Features

  • Use official wasm support from upstream envoy, rather than envoy-wasm fork. (https://github.com/solo-io/gloo/issues/3753)
  • Allow automatic discovery of TLS when using consul services. Requires serveral changes to gloo's helm config to use:
    Set the settings.integrations.consul.useTls flag to true.
    Assign a tag for gloo to recognize as the TLS tag if the default (settings.integrations.consul.tlsTagName=glooUseTls) is insufficient.
    Add the consul root CA for gloo to use at settings.integrations.consul.rootCA
    Once these are setup in gloo, adding the tlsTagName value as a tag to consul services should cause upstreams to automatically
    have TLS when discovered by gloo. As part of this change, the behavior of tag matching between gloo upstreams
    and consul service instances was changed from an exact set match to a subset match.
    Now a match is found if an upstream's instanceTags are a subset of a service instance's tags. (https://github.com/solo-io/gloo/issues/2544)

Fixes

  • Fix the validation API to only return proxies that would be generated by proposed resources if requested. This change means the default behavior matches the kubernetes validation webhook API. By including the top-level value returnProxies=true in the json/yaml request to the API, you can signal the endpoint to return the proxies that would be generated (previously, always returning by default). (https://github.com/solo-io/gloo/issues/3613)
gloo - v1.5.1

Published by kdorosh about 4 years ago

Helm Changes

  • Fix helm chart to honor .Values.settings.replaceInvalidRoutes value. This change makes the default invalid route behavior match what's documented (disabled by default). To enable again, set .Values.settings.replaceInvalidRoutes=true (https://github.com/solo-io/gloo/issues/3619)
  • Remove duplicate helm values that are no longer needed to keep hook-created values in helm releases. Backport for v1.5. (https://github.com/solo-io/gloo/issues/3498)

Fixes

gloo - v1.6.0-beta2

Published by kdorosh about 4 years ago

This release contained no user-facing changes.

gloo - v1.6.0-beta1

Published by kdorosh about 4 years ago

Helm Changes

New Features

Fixes

gloo - v1.4.8-patch1

Published by yuval-k about 4 years ago

This release build failed.

Fixes

gloo - v1.5.0

Published by kdorosh about 4 years ago

Dependency Bumps

  • solo-io/envoy-gloo has been upgraded to 1.16.0-rc4.

Fixes

gloo - v1.3.34

Published by kdorosh about 4 years ago

Dependency Bumps

  • solo-io/envoy-gloo has been upgraded to 1.14.3-patch2.

Fixes

gloo - v1.4.15

Published by kdorosh about 4 years ago

Dependency Bumps

  • solo-io/envoy-gloo has been upgraded to 1.15.0-patch4.

Fixes

gloo - v1.5.0-beta28

Published by kdorosh about 4 years ago

Dependency Bumps

  • solo-io/envoy-gloo has been upgraded to 1.16.0-rc3.

Fixes

gloo - v1.5.0-beta27

Published by kdorosh about 4 years ago

New Features

  • Add API to AuthConfig that allows users to specify a boolean expression to determine how to evaluate auth configs within an auth chain. Previously, each config on an auth config must be authorized for the entire request to be authorized. This remains the default, but now users can additionally specify a boolean expression (the booleanExpr field on an auth config) to reference the auth configs and AND/OR/NOT them together to achieve the desired access policy. (https://github.com/solo-io/gloo/issues/3207)
gloo - v1.5.0-beta26

Published by Sodman about 4 years ago

Fixes

gloo - v1.3.33

Published by kdorosh about 4 years ago

Fixes

  • Generate standard Kubernetes go types and clients for AuthConfig custom resources so users can programmatically manage these objects without having to use our solo-kit based clients. (https://github.com/solo-io/gloo/issues/3643)
gloo - v1.4.14

Published by kdorosh about 4 years ago

Fixes

  • Generate standard Kubernetes go types and clients for AuthConfig custom resources so users can programmatically manage these objects without having to use our solo-kit based clients. (https://github.com/solo-io/gloo/issues/3643)
gloo - v1.5.0-beta25

Published by kdorosh about 4 years ago

New Features

  • Add new field inheritableMatchers boolean field (default false) to virtual services and route tables that, when true, changes how route delegation handles header, method, and query parameter matchers from the parent resource. By default, route tables must have matchers that are a superset of those from the parent, as this improves readability. By setting inheritableMatchers to true, any header, method, and query parameter matchers from the parent that are absent from the child will be automatically included on the generated route. (https://github.com/solo-io/gloo/issues/3327)
  • Generate standard Kubernetes go types and clients for AuthConfig custom resources so users can programmatically manage these objects without having to use our solo-kit based clients. (https://github.com/solo-io/gloo/issues/3643)

Fixes

gloo - v1.4.13

Published by yuval-k about 4 years ago

Fixes

gloo - v1.5.0-beta24

Published by yuval-k about 4 years ago

Fixes

gloo - v1.5.0-beta23

Published by arianaw66 about 4 years ago

Dependency Bumps

  • envoyproxy/envoy has been upgraded to v1.16-rc2.
  • solo-io/skv2 has been upgraded to v0.8.1.

New Features

  • Added improvements to the user experience for using gloo with Istio. Added helper commands for glooctl, so that users can simply perform glooctl istio inject and glooctl istio enable-mtls --upstream foo in order to have Gloo and Istio up and running and communicating together over mTLS. (https://github.com/solo-io/gloo/issues/3532)
  • Allow secrets to be added to request headers by referencing a k8s secret resource via its namespace and name. (https://github.com/solo-io/gloo/issues/2751)
  • Change the glooctl cluster unregister command to glooctl cluster deregister. The deregister command now deletes the service account, cluster role, and cluster role binding created on the remote cluster during the cluster registration process. Example usage is glooctl cluster deregister --cluster-name kind-remote --remote-context kind-remote. (https://github.com/solo-io/gloo/issues/3369)

Fixes

gloo - v1.5.0-beta22

Published by marcogschmidt about 4 years ago

This release contained no user-facing changes.

Package Rankings
Top 1.19% on Proxy.golang.org
Related Projects