gloo

The Feature-rich, Kubernetes-native, Next-Generation API Gateway Built on Envoy

APACHE-2.0 License

Stars
3.9K
Committers
176

Bot releases are hidden (Show)

gloo - v1.2.20

Published by arianaw66 over 4 years ago

Fixes

  • When a Gateway has an empty httpGateway.virtualServiceNamespaces list, it will now search for virtual services in all the namespaces watched by Gloo. Previously the behavior was to include only virtual services in the same namespace as the gateway, which has proven unintuitive to users. (https://github.com/solo-io/gloo/issues/2156)
gloo - v1.3.7

Published by marcogschmidt over 4 years ago

Helm Changes

New Features

Fixes

  • When a Gateway has an empty httpGateway.virtualServiceNamespaces list, it will now search for virtual services in all the namespaces watched by Gloo. Previously the behavior was to include only virtual services in the same namespace as the gateway, which has proven unintuitive to users. (https://github.com/solo-io/gloo/issues/2156)
gloo - v1.3.6

Published by marcogschmidt over 4 years ago

Dependency Bumps

  • solo-io/wasme has been upgraded to v0.0.13-rc1.
  • solo-io/solo-kit has been upgraded to v0.13.2.

Helm Changes

  • We are introducing a new Helm value global.glooMtls.enabled to enable mTLS between Gloo and Envoy (https://github.com/solo-io/gloo/issues/2134). An example of a helm override file that enables MTLS authentication is:
  glooMtls:
    enabled: true

New Features

  • Allow enabling mTLS authentication between the Gloo control plane and Envoy instances. Since the Envoy configuration can contain secret data, plaintext communication between Gloo and Envoy is too insecure in certain scenarios (e.g. if your setup has the Gloo control plane and Envoy instances running in separate clusters). Turning on mTLS will encrypt the xDS communication between Gloo and Envoy. (https://github.com/solo-io/gloo/issues/2134)

Fixes

gloo - v1.2.19

Published by arianaw66 over 4 years ago

Fixes

  • Fixes listener config sent to envoy to be idempotent, so that config no longer reloads as "different" when there are no changes. This resolves the issue of the "Average Request Time" graph in grafana showing gaps in the downstream data, among other potential issues. (https://github.com/solo-io/gloo/issues/2185)
gloo - v1.2.18

Published by kdorosh over 4 years ago

Fixes

  • Expose the disableKubernetesDestinations settings field as a Helm chart value, which if enabled in a Gloo deployment monitoring a large number of kubernetes services, can drastically reduce Gloo memory usage. (https://github.com/solo-io/gloo/issues/2299)
gloo - v1.3.5

Published by yuval-k over 4 years ago

New Features

  • Currently, when a delegated route defines a RouteTableSelector that matches multiple route tables, Gloo has no way of determining the order in which to process the route tables; in these cases, to avoid short-circuiting routes (e.g. having a route with a /foo path prefix matcher before one with /foo/bar), Gloo currently automatically sorts the routes by descending specificity of their matchers. While this prevents short-circuiting errors, it can lead to undesired behavior in cases where the user wants complete control over the final ordering of their routes. To prevent this, we are adding an optional weight field to the RouteTable resource. Gloo will now inspect this field to determine the order in which route tables are to be evaluated when a selector matches multiple ones. This will give the user control over the order in which the routes will appear on the final Proxy resource. The field is optional; if no value is specified, the weight defaults to 0 (zero). Gloo will process the route tables matched by a selector in ascending order by weight and collect the routes of each route table in the order they are defined. If multiple route tables define the same weight, Gloo will sort the routes which belong to those tables to avoid short-circuiting. In this scenario, Gloo will also alert the user by adding a warning to the status of the parent resource (the one that specifies the RouteTableSelector). (https://github.com/solo-io/gloo/issues/2233)

Fixes

gloo - v1.3.4

Published by yuval-k over 4 years ago

Dependency Bumps

  • solo-io/solo-kit has been upgraded to v0.13.1.
  • solo-io/envoy-gloo has been upgraded to v0.1.20.

New Features

Fixes

gloo - v1.2.17

Published by yuval-k over 4 years ago

Fixes

gloo - v1.3.3

Published by marcogschmidt over 4 years ago

New Features

Fixes

gloo - v1.2.16

Published by marcogschmidt over 4 years ago

Dependency Bumps

  • solo-io/solo-kit has been upgraded to v0.11.17.

New Features

Fixes

gloo - v1.3.2

Published by marcogschmidt almost 5 years ago

Downgrading this to a pre-release due to the following regressions:

Dependency Bumps

  • solo-io/go-utils has been upgraded to v0.13.1.

New Features

  • Add glooctl ui command to open Gloo UI from the command line. (https://github.com/solo-io/gloo/issues/1706)
  • Update the Delegation API to support delegating routing decisions to multiple RouteTables. RouteTables to delegate to can be selected by either namespaces, labels, or both, using the new RouteTableSelector field. The routes of all matching RouteTables will be merged and the resulting route set will be sorted by descending specificity of the matchers on each route, e.g. matchers with longer prefixes will appear first. This feature is meant to replace the virtual service merging feature that we deprecated with the stable v1 release of Gloo. Virtual service merging allowed users to define multiple VirtualServices for the same domain, which Gloo would then merge into a single VirtualHost on the Proxy resource. Although useful to many users, this feature could lead to confusion: the API is not self-documenting with respect to the merging behavior and multiple users could inadvertently step on each other's toes when defining routes for the same domain. As of this release, virtual service merging is not supported anymore; defining two virtual services with overlapping domain sets will result in an error. To be able to define the routes for a given domain on different resources, users can now use the Delegation API. With the new RouteTableSelector attribute, the Delegation API now enables the same use cases as virtual service merging and has the advantage of surfacing the fact that multiple resources define routes for the same domains to the API. To give a simple example, a Gloo administrator can define a VirtualService with a single route that delegates all requests for a domain to any RouteTables that have the domain: example.com label (namespaces to search can be configured as well); this will allow users to add routes for that domain by creating their own RouteTables (with a domain: example.com label) without having to request updates to the parent VirtualService. (https://github.com/solo-io/gloo/issues/2054)

Fixes

  • fix whitespace issue in helm chart (https://github.com/solo-io/gloo/issues/2159)
  • fix glooctl install ingress/knative to nest helm overrides under "gloo" when a GlooE chart is passed with -f flag (https://github.com/solo-io/gloo/issues/1999)
  • fix glooctl install gateway enterprise to stop nesting helm overrides under "gloo" when a Gloo open-source chart is passed with the -f flag (https://github.com/solo-io/gloo/issues/2145)
  • Fix error (and repetitive logging) when Gateway Notification Channel is closed. This issue can happen when network communication between tthe Gloo and Gateway pods is interrupted. (https://github.com/solo-io/gloo/issues/2070)
  • Introduce a feature flag in the Settings CRD named disableProxyGarbageCollection, located under the 'gloo' options. Set this option to determine the state of the envoy configuration when a virtual service is deleted, resulting in a proxy with no configured routes. Set to true if you wish to keep envoy serving the routes from the latest valid configuration. Set to false if you wish to reset the envoy configuration to a clean slate with no routes. disableProxyGarbageCollection defaults to 'false'. (https://github.com/solo-io/gloo/issues/1245)
gloo - v1.2.15

Published by marcogschmidt almost 5 years ago

Fixes

  • Fix error (and repetitive logging) when Gateway Notification Channel is closed. This issue can happen when network communication between tthe Gloo and Gateway pods is interrupted. (https://github.com/solo-io/gloo/issues/2070)
  • Wire in grpc web into gloo. (https://github.com/solo-io/gloo/issues/555)
  • Update the delegation API to support delegating to multiple route tables. Route tables to delegate to can be selected by either namespaces, labels, or both, using the new RouteTableSelector field. The routes of all matching route tables will be merged and the resulting route set will be sorted by descending specificity of the matchers on each route, i.e. matchers with longer prefixes will appear first (delegated routes can only have prefix matchers). (https://github.com/solo-io/gloo/issues/2054)
gloo - v1.3.1

Published by marcogschmidt almost 5 years ago

Dependency Bumps

  • solo-io/solo-kit has been upgraded to v0.12.1.

New Features

  • Make Gloo fully compatible with go.mod, so that it can be run outside of the GOPATH. As a result of this all of the proto import paths needed to be stripped of the github.com/solo-io prefix, as that is no longer assured outside of the GOPATH. (https://github.com/solo-io/gloo/issues/835)

Fixes

gloo - v1.3.0

Published by kdorosh almost 5 years ago

New Features

  • Add a new auth_endpoint_query_params field to the AuthConfig CRD. When using the Gloo Enterprise OAuth feature, this allows you to append additional query parameters to the request that Gloo sends to the OIDC authorization endpoint to initiate the authorization code flow. This can be useful to integrate Gloo with some identity providers that require custom parameters to be sent to the authorization endpoint.
    The new field is a map, where each key-value pair will result in an additional query parameter:
  name: google-oidc
  namespace: gloo-system
spec:
  configs:
  - oauth:
      app_url: http://localhost:8080
      callback_path: /callback
      client_id: $CLIENT_ID
      client_secret_ref:
        name: google
        namespace: gloo-system
      issuer_url: https://accounts.google.com
      auth_endpoint_query_params:
        key1 : value1
        key2 : value2

We also added a new --auth-endpoint-query-params flag to the glooctl create authconfig command; the flag takes in a comma-separated list of key value pairs (e.g. a=b,c=d). (https://github.com/solo-io/gloo/issues/2030)

  • Allow users to specify which release version to install via glooctl with: glooctl install gateway enterprise --version 0.20.6 or glooctl install gateway --version 1.2.1 (https://github.com/solo-io/gloo/issues/1863)
gloo - v1.2.14

Published by kdorosh almost 5 years ago

Marked as a pre-release as it tracks the 1.3.x branch instead of the 1.2.x branch, and has some new features. 1.2.15 will be a patch release for any fixes since 1.2.12 (the v1.2.x branch)

Dependency Bumps

  • solo-io/go-utils has been upgraded to v0.11.7.

New Features

  • Support Manual configuration of SSL for Knative Services. Using the annotations gloo.networking.knative.dev/ssl.sni_domains and gloo.networking.knative.dev/ssl.secret_name, users can manually configure Gloo to serve TLS for their Knative Services (https://github.com/solo-io/gloo/issues/2048)
gloo - v1.2.13

Published by kdorosh almost 5 years ago

This release build failed. (Helm charts failed to publish for this version)

Marked as a pre-release as it tracks the 1.3.x branch instead of the 1.2.x branch, and has some new features. 1.2.15 will be a patch release for any fixes since 1.2.12 (the v1.2.x branch)

Dependency Bumps

  • solo-io/go-utils has been upgraded to v0.11.5.

Helm Changes

  • Ensure that all stats server settings are consistent across open source and enterprise Gloo by moving the enabled logic into a global helper template. This change introduces a global value that all deployments will use as their default stats server settings: global.glooStats.enabled. This value can be overridden by an individual deployment by setting a field on that deployment. For example, to disable stats on discovery, you can do discovery.deployment.stats.enabled=false. Note that this change has converted the stats field on our deployment objects from a boolean to an object with an enabled boolean field inside of it. (https://github.com/solo-io/gloo/issues/1884)

New Features

Fixes

  • Don't error on install if gloo installation namespace already exists. (https://github.com/solo-io/gloo/issues/1988)
  • Settings and Gateway resources currently get automatically created when the gloo and gateway pods (respectively) start up. This creates a race condition with our installation that we currently solve by creating our default Settings and Gateways as Helm Hook resources, which means that they are not managed as a part of the Helm release lifecycle. This is fixed by no longer creating those resources if they do not exist when the pods start up. (https://github.com/solo-io/gloo/issues/1828)
gloo - v1.2.12

Published by kdorosh almost 5 years ago

This release contained no user-facing changes.

gloo - v1.2.11

Published by marcogschmidt almost 5 years ago

This release build failed.

New Features

Fixes

gloo - v1.2.10

Published by yuval-k almost 5 years ago

Fixes

  • glooctl assumed a kube-based environment when checking for a client/Server version mismtach. When using Consul, this caused a delay in the glooctl command while the connection to kubernetes timed out and a kubernetes error message. The version check for non-kubernetes environments is now disabled. (https://github.com/solo-io/gloo/issues/1893)
gloo - v1.2.9

Published by marcogschmidt almost 5 years ago

This release build failed.

Fixes

Package Rankings
Top 1.19% on Proxy.golang.org
Related Projects