Skip to content

fix(deps): update go-dependencies#880

Merged
aknuds1 merged 2 commits intomainfrom
deps-update/go-dependencies
Feb 17, 2026
Merged

fix(deps): update go-dependencies#880
aknuds1 merged 2 commits intomainfrom
deps-update/go-dependencies

Conversation

@renovate-sh-app
Copy link
Copy Markdown
Contributor

@renovate-sh-app renovate-sh-app bot commented Jan 19, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Type Update Change Age Confidence
github.com/grafana/dskit require digest 1a1acfbab41154
github.com/hashicorp/consul/api require minor v1.15.3v1.33.2 age confidence
github.com/miekg/dns require patch v1.1.69v1.1.72 age confidence
github.com/pires/go-proxyproto require minor v0.8.1v0.11.0 age confidence
go.etcd.io/etcd/api/v3 require patch v3.6.7v3.6.8 age confidence
go.etcd.io/etcd/client/pkg/v3 require patch v3.6.7v3.6.8 age confidence
go.etcd.io/etcd/client/v3 require patch v3.6.7v3.6.8 age confidence
go.opentelemetry.io/contrib/exporters/autoexport require minor v0.64.0v0.65.0 age confidence
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc require minor v0.64.0v0.65.0 age confidence
go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace require minor v0.64.0v0.65.0 age confidence
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp require minor v0.64.0v0.65.0 age confidence
go.opentelemetry.io/contrib/propagators/jaeger require minor v1.39.0v1.40.0 age confidence
go.opentelemetry.io/contrib/samplers/jaegerremote require minor v0.33.0v0.34.0 age confidence
golang.org/x/exp require digest 87e1e7381e46e3 age confidence
golang.org/x/net require minor v0.48.0v0.50.0 age confidence
google.golang.org/grpc require minor v1.78.0v1.79.1 age confidence

Release Notes

hashicorp/consul (github.com/hashicorp/consul/api)

v1.22.0

Compare Source

1.22.0 Enterprise (October 24, 2025)

SECURITY:

  • connect: Upgrade Consul's bundled Envoy version to 1.35.3 and remove support for 1.31.10. This update also includes a fix to prevent Envoy (v1.35+) startup failures by only configuring the TLS transport socket when the CA bundle is present. [GH-22824]
  • security: Adding warning when remote/local script checks are enabled without enabling ACL's [GH-22877]
  • security: Improved validation of the Content-Length header in the Consul KV endpoint to prevent potential denial of service attacksCVE-2025-11374 [GH-22916]
  • security: adding a maximum Content-Length on the event endpoint to fix denial-of-service (DoS) attacks. This resolves CVE-2025-11375. [GH-22836]
  • security: breaking change - adding a key name validation on the key/value endpoint along side with the DisableKVKeyValidation config to disable/enable it to fix path traversal attacks on misconfigured or missing ACL policies. [GH-22850]

FEATURES:

  • Added support to register a service in consul with multiple ports [GH-22769]
  • agent: Added IsDualStack utility function to detect if the agent is configured for both IPv4 and IPv6 (dual-stack mode) based on its bind address retrieved from "agent/self" API. [GH-22741]
  • install: Updated license information displayed during post-install
  • ipv6: addtition of ip6tables changes for ipv6 and dual stack support [GH-22787]
  • oidc: add client authentication using JWT assertion and PKCE. default PKCE is enabled. [GH-22732]

IMPROVEMENTS:

  • security: Upgrade golang to 1.25.3. [GH-22926]
  • ui: Fixes computed property override issues currently occurring and in some cases pre-emptively as this has been deprecated in ember v4 [GH-22947]
  • ui: removes send action instances as part of https://deprecations.emberjs.com/id/ember-component-send-action/ [GH-22938]
  • ui: replaced ember partials with components as an incremental step to upgrade to ember v4 [GH-22888]
  • api: Added a new API (/v1/operator/utilization) to support enterprise API for Manual Snapshot Reporting [GH-22837]
  • cmd: Added new subcommand consul operator utilization [-today-only] [-message] [-y] to generate a bundle with census utilization snapshot. Main flow is implemented in consul-enterprise
    http: Added a new API Handler for /v1/operator/utilization. Core functionality to be implemented in consul-enterprise
    agent: Always enabled census metrics collection with configurable option to export it to Hashicorp Reporting [GH-22843]
  • cli: snapshot agent now supports authenticating to Azure Blob Storage using Azure Managed Service Identities (MSI). [GH-11171]
  • command: connect envoy bootstrap defaults to 127.0.0.1 in IPv4-only environment and to ::1 in IPv6/DualStack environment. [GH-22763]
  • connect: default upstream.local_bind_address to ::1 for IPv6 agent bind address [GH-22773]
  • proxy: default proxy.local_service_address to ::1 for IPv6 agent bind address [GH-22772]
  • ui: Improved accessibility features in the Consul UI to enhance usability for users with disabilities [GH-22770]
  • ui: Replace yarn with pnpm for package management [GH-22790]
  • ui: auth method config values were overflowing. This PR fixes the issue and adds word break for table elements with large content. [GH-22813]

BUG FIXES:

  • ui: Allow FQDN to be displayed in the Consul web interface. [GH-22779]
  • ui: fixes the issue where namespaces where disappearing and Welcome to Namespace screen showed up after tab switching [GH-22789]
  • ui: fixes the issue where when doing deletes of multiple tokens or policies, the three dots on the right hand side stops responding after the first delete. [GH-22752]
  • cmd: Fix consul operator utilization --help to show only available options without extra parameters. [GH-22912]

v1.21.5

Compare Source

1.21.5 (September 21, 2025)

SECURITY:

  • Migrate transitive dependency from archived mitchellh/mapstructure to go-viper/mapstructure to v2 to address CVE-2025-52893. [GH-22581]
  • agent: Add the KV Validations to block path traversal allowing access to unauthorized endpoints. [GH-22682]
  • agent: Fix a security vulnerability to filter out anonymous tokens along with empty tokens when setting the Results-Filtered-By-ACLs header [GH-22534]
  • agent: Fix a security vulnerability where the attacker could read agent’s TLS certificate and private key by using the group ID that the Consul agent runs as. [GH-22626]
  • api: add charset in all applicable content-types. [GH-22598]
  • connect: Upgrade envoy version to 1.34.7 [GH-22735]
  • security: Fix GHSA-65rg-554r-9j5x (CVE-2024-48908) by upgrading lycheeverse/lychee-action. [GH-22667]
  • security: Fix a security vulnerability where the attacker could bypass authentication by passing url params as there was no validation on them. [GH-22612]
  • security: perform constant time compare for sensitive values. [GH-22537]
  • security: upgrade go version to 1.25.0 [GH-22652]
  • security:: (Enterprise only) fix nil pointer dereference.
  • security:: (Enterprise only) fix potential race condition in partition CRUD.
  • security:: (Enterprise only) perform constant time compare for sensitive values.

FEATURES:

  • config: Add new parameter max_request_headers_kb to configure maximum header size for requests from downstream to upstream [GH-22604]
  • config: Handle a new parameter max_request_headers_kb to configure maximum header size for requests from downstream to upstream in API Gateway config and proxy-defaults [GH-22679]
  • config: Handle a new parameter max_request_headers_kb to configure maximum header size for requests from downstream to upstream in Mesh Gateway via service-defaults and proxy-defaults [GH-22722]
  • config: Handle a new parameter max_request_headers_kb to configure maximum header size for requests from downstream to upstream in Terminating Gateway service-defaults and proxy-defaults [GH-22680]

IMPROVEMENTS:

  • cli: add troubleshoot ports in debug command. A ports.json file is created, which lists the open or closed ports on the host where the command is executed. [GH-22624]

BUG FIXES:

  • agent: Don't show admin partition during errors [GH-11154]

v1.21.4

Compare Source

1.21.4 (August 13, 2025)

SECURITY:

IMPROVEMENTS:

  • ui: Replaced internal code editor with HDS (HashiCorp Design System) code editor and code block components for improved accessibility and maintainability across the Consul UI. [GH-22513]

BUG FIXES:

  • cli: capture pprof when ACL is enabled and a token with operator:read is used, even if enable_debug config is not explicitly set. [GH-22552]

v1.21.3

Compare Source

1.21.3 (July 18, 2025)

IMPROVEMENTS:

  • ui: Improved display and handling of IPv6 addresses for better readability and usability in the Consul web interface. [GH-22468]

BUG FIXES:

  • cli: validate IP address in service registration to prevent invalid IPs in service and tagged addresses. [GH-22467]
  • ui: display IPv6 addresses with proper bracketed formatting [GH-22423]

v1.21.2

Compare Source

1.21.2 (June 17, 2025)

SECURITY:

IMPROVEMENTS:

  • config: Warn about invalid characters in datacenter resulting in non-generation of X.509 certificates when using external CA for agent TLS communication. [GH-22382]
  • connect: Use net.JoinHostPort for host:port formatting to handle IPv6. [GH-22359]

BUG FIXES:

  • http: return a clear error when both Service.Service and Service.ID are missing during catalog registration [GH-22381]
  • license: (Enterprise only) Fixed issue where usage metrics are not written to the snapshot to export the license data. [GH-10668]
  • wan-federation: Fixed an issue where advertised IPv6 addresses were causing WAN federation to fail. [GH-22226]

v1.21.1

Compare Source

1.21.1 (May 21, 2025)

FEATURES:

  • xds: Extend LUA Script support for API Gateway [GH-22321]
  • xds: Added a configurable option to disable XDS session load balancing, intended for scenarios where an external load balancer is used in front of Consul servers, making internal load balancing unnecessary.

IMPROVEMENTS:

  • http: Add peer query param on catalog service API [GH-22189]

v1.21.0

Compare Source

1.21.0 (May 06, 2025)

FEATURES:

  • Simplified external service discovery (Agentless/Gossipless)
  • Google Cloud Storage support for K8s snapshots
  • OpenShift 4.17 support
  • Pod Security Admissions compatibility
  • Refreshed documentation structure
  • Support for TLS SNI in remote JSONWebKeySet [GH-22177]

🔗 Link to full release details

IMPROVEMENTS:

  • raft: add a configuration raft_prevote_disabled to allow disabling raft prevote [GH-21758]
  • raft: update raft library to 1.7.0 which include pre-vote extension [GH-21758]
  • SubMatView: Log level change from ERROR to INFO for subject materialized view as subscription creation is retryable on ACL change. [GH-22141]
  • ui: Adds a copyable token accessor/secret on the settings page when signed in [GH-22105]
  • xDS: Log level change from ERROR to INFO for xDS delta discovery request. Stream can be cancelled on server shutdown and other scenarios. It is retryable and error is a superfluous log. [GH-22141]

v1.20.0

Compare Source

1.20.0 (October 14, 2024)

SECURITY:

  • Explicitly set 'Content-Type' header to mitigate XSS vulnerability. [GH-21704]
  • Implement HTML sanitization for user-generated content to prevent XSS attacks in the UI. [GH-21711]
  • UI: Remove codemirror linting due to package dependency [GH-21726]
  • Upgrade Go to use 1.22.7. This addresses CVE
    CVE-2024-34155 [GH-21705]
  • Upgrade to support aws/aws-sdk-go v1.55.5 or higher. This resolves CVEs
    CVE-2020-8911 and
    CVE-2020-8912. [GH-21684]
  • ui: Pin a newer resolution of Braces [GH-21710]
  • ui: Pin a newer resolution of Codemirror [GH-21715]
  • ui: Pin a newer resolution of Markdown-it [GH-21717]
  • ui: Pin a newer resolution of ansi-html [GH-21735]

FEATURES:

  • grafana: added the dashboards service-to-service dashboard, service dashboard, and consul dataplane dashboard [GH-21806]
  • server: remove v2 tenancy, catalog, and mesh experiments [GH-21592]

IMPROVEMENTS:

  • security: upgrade ubi base image to 9.4 [GH-21750]
  • connect: Add Envoy 1.31 and 1.30 to support matrix [GH-21616]

BUG FIXES:

  • jwt-provider: change dns lookup family from the default of AUTO which would prefer ipv6 to ALL if LOGICAL_DNS is used or PREFER_IPV4 if STRICT_DNS is used to gracefully handle transitions to ipv6. [GH-21703]

v1.19.2

Compare Source

1.19.2 (August 26, 2024)

SECURITY:

  • ui: Upgrade modules with d3-color as a dependency to address denial of service issue in d3-color < 3.1.0 [GH-21588]

IMPROVEMENTS:

  • Use Envoy's default for a route's validate_clusters option, which is false. This fixes a case where non-existent clusters could cause a route to no longer route to any of its backends, including existing ones. [GH-21587]

BUG FIXES:

  • api-gateway: (Enterprise only) ensure clusters are properly created for JWT providers with a remote URI for the JWKS endpoint [GH-21604]

v1.19.1

Compare Source

1.19.1 (July 11, 2024)

SECURITY:

IMPROVEMENTS:

  • mesh: update supported envoy version 1.29.5 in addition to 1.28.4, 1.27.6. [GH-21277]

BUG FIXES:

  • core: Fix multiple incorrect type conversion for potential overflows [GH-21251]
  • core: Fix panic runtime error on AliasCheck [GH-21339]
  • dns: Fix a regression where DNS SRV questions were returning duplicate hostnames instead of encoded IPs.
    This affected Nomad integrations with Consul. [GH-21361]
  • dns: Fix a regression where DNS tags using the standard lookup syntax, tag.name.service.consul, were being disregarded. [GH-21361]
  • dns: Fixes a spam log message "Failed to parse TTL for prepared query..."
    that was always being logged on each prepared query evaluation. [GH-21381]
  • terminating-gateway: (Enterprise Only) Fixed issue where enterprise metadata applied to linked services was the terminating-gateways enterprise metadata and not the linked services enterprise metadata. [GH-21382]
  • txn: Fix a bug where mismatched Consul server versions could result in undetected data loss for when using newer Transaction verbs. [GH-21519]

v1.19.0

Compare Source

1.19.0 (June 12, 2024)

BREAKING CHANGES:

  • telemetry: State store usage metrics with a double consul element in the metric name have been removed. Please use the same metric without the second consul instead. As an example instead of consul.consul.state.config_entries use consul.state.config_entries [GH-20674]

SECURITY:

FEATURES:

  • dns: queries now default to a refactored DNS server that is v1 and v2 Catalog compatible.
    Use v1dns in the experiments agent config to disable.
    The legacy server will be removed in a future release of Consul.
    See the Consul 1.19.x Release Notes for removed DNS features. [GH-20715]
  • gateways: api-gateway can leverage listener TLS certificates available on the gateway's local filesystem by specifying the public certificate and private key path in the new file-system-certificate configuration entry [GH-20873]

IMPROVEMENTS:

  • dns: new version was not supporting partition or namespace being set to 'default' in CE version. [GH-21230]
  • mesh: update supported envoy version 1.29.4 in addition to 1.28.3, 1.27.5, 1.26.8. [GH-21142]
  • upgrade go version to v1.22.4. [GH-21265]
  • Upgrade github.com/envoyproxy/go-control-plane to 0.12.0. [GH-20973]
  • dns: DNS-over-grpc when using consul-dataplane now accepts partition, namespace, token as metadata to default those query parameters.
    consul-dataplane v1.5+ will send this information automatically. [GH-20899]
  • snapshot: Add consul snapshot decode CLI command to output a JSON object stream of all the snapshots data. [GH-20824]
  • telemetry: Add telemetry.disable_per_tenancy_usage_metrics in agent configuration to disable setting tenancy labels on usage metrics. This significantly decreases CPU utilization in clusters with many admin partitions or namespaces.
  • telemetry: Improved the performance usage metrics emission by not outputting redundant metrics. [GH-20674]

DEPRECATIONS:

  • snapshot agent: (Enterprise only) Top level single snapshot destinations local_storage, aws_storage, azure_blob_storage, and google_storage in snapshot agent configuration files are now deprecated. Use the backup_destinations config object instead.

BUG FIXES:

v1.18.2

Compare Source

1.18.2 (May 14, 2024)

Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.

SECURITY:

IMPROVEMENTS:

  • gateways: service defaults configuration entries can now be used to set default upstream limits for mesh-gateways [GH-20945]
  • connect: Add ability to disable Auto Host Header Rewrite on Terminating Gateway at the service level [GH-20802]

BUG FIXES:

  • dns: fix a bug with sameness group queries in DNS where responses did not respect DefaultForFailover.
    DNS requests against sameness groups without this field set will now error as intended.
  • error running consul server in 1.18.0: failed to configure SCADA provider user's home directory path: $HOME is not defined [GH-20926]
  • server: fix Ent snapshot restore on CE when CE downgrade is enabled [GH-20977]
  • xds: Make TCP external service registered with terminating gateway reachable from peered cluster [GH-19881]

v1.18.1

Compare Source

1.18.1 (March 26, 2024)

Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.

BREAKING CHANGES:

  • ui: Adds a "Link to HCP Consul Central" modal with integration to side-nav and link to HCP banner. There will be an option to disable the Link to HCP banner from the UI in a follow-up release. [GH-20474]

SECURITY:

IMPROVEMENTS:

  • api: Randomize the returned server list for the WatchServers gRPC endpoint. [GH-20866]
  • partitions: (Enterprise only) Allow disabling of Gossip per Partition [GH-20669]
  • snapshot agent: (Enterprise only) Add support for multiple snapshot destinations using the backup_destinations config file object.
  • xds: Improved the performance of xDS server side load balancing. Its slightly improved in Consul CE with drastic CPU usage reductions in Consul Enterprise. [GH-20672]

BUG FIXES:

  • audit-logs: (Enterprise Only) Fixes non ASCII characters in audit logs because of gzip. [GH-20345]
  • connect: Fix issue where Consul-dataplane xDS sessions would not utilize the streaming backend for wan-federated queries. [GH-20868]
  • connect: Fix potential goroutine leak in xDS stream handling. [GH-20866]
  • connect: Fix xDS deadlock that could result in proxies being unable to start. [GH-20867]
  • ingress-gateway: (Enterprise Only) Fix a bug where on update, Ingress Gateways lost all upstreams for listeners with wildcard services in a different namespace.

v1.18.0

Compare Source

BREAKING CHANGES:

  • config-entries: Allow disabling request and idle timeouts with negative values in service router and service resolver config entries. [GH-19992]
  • telemetry: Adds fix to always use the value of telemetry.disable_hostname when determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated as true, even though its default value is false. [GH-20312]

SECURITY:

FEATURES:

  • acl: add policy bindtype to binding rules. [GH-19499]
  • agent: Introduces a new agent config default_intention_policy to decouple the default intention behavior from ACLs [GH-20544]
  • agent: (Enterprise Only) Add fault injection filter support for Consul Service Mesh
  • cloud: Adds new API/CLI to initiate and manage linking a Consul cluster to HCP Consul Central [GH-20312]
  • dns: adds experimental support for a refactored DNS server that is v1 and v2 Catalog compatible.
    Use v2dns in the experiments agent config to enable.
    It will automatically be enabled when using the resource-apis (Catalog v2) experiment.
    The new DNS implementation will be the default in Consul 1.19.
    See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643]
  • ui: Added a banner to let users link their clusters to HCP [GH-20275]
  • ui: Adds a redirect and warning message around unavailable UI with V2 enabled [GH-20359]
  • ui: adds V2CatalogEnabled to config that is passed to the ui [GH-20353]
  • v2: prevent use of the v2 experiments in secondary datacenters for now [GH-20299]

IMPROVEMENTS:

  • cloud: unconditionally add Access-Control-Expose-Headers HTTP header [GH-20220]
  • connect: Replace usage of deprecated Envoy field envoy.config.core.v3.HeaderValueOption.append. [GH-20078]
  • connect: Replace usage of deprecated Envoy fields envoy.config.route.v3.HeaderMatcher.safe_regex_match and envoy.type.matcher.v3.RegexMatcher.google_re2. [GH-20013]
  • docs: add Link API documentation [GH-20308]
  • resource: lowercase names enforced for v2 resources only. [GH-19218]

BUG FIXES:

  • dns: SERVFAIL when resolving not found PTR records. [GH-20679]
  • raft: Fix panic during downgrade from enterprise to oss. [GH-19311]
  • server: Ensure controllers are automatically restarted on internal stream errors. [GH-20642]
  • server: Ensure internal streams are properly terminated on snapshot restore. [GH-20642]
  • snapshot-agent: (Enterprise only) Fix a bug with static AWS credentials where one of the key id or secret key is provided via config file and the other is provided via an environment variable.

v1.17.0

Compare Source

1.17.0 (October 31, 2023)

BREAKING CHANGES:

  • api: RaftLeaderTransfer now requires an id string. An empty string can be specified to keep the old behavior. [GH-17107]
  • audit-logging: (Enterprise only) allowing timestamp based filename only on rotation. initially the filename will be just file.json [GH-18668]

DEPRECATIONS:

  • cli: Deprecate the -admin-access-log-path flag from consul connect envoy command in favor of: -admin-access-log-config. [GH-15946]

SECURITY:

FEATURE PREVIEW: Catalog v2

This release provides the ability to preview Consul's v2 Catalog and Resource API if enabled. The new model supports
multi-port application deployments with only a single Envoy proxy. Note that the v1 and v2 catalogs are not cross
compatible, and not all Consul features are available within this v2 feature preview. See the v2 Catalog and Resource
API documentation
for more information. The v2 Catalog and
Resources API should be considered a feature preview within this release and should not be used in production
environments.

Limitations

  • The v2 catalog API feature preview does not support connections with client agents. As a result, it is only available for Kubernetes deployments, which use Consul dataplanes instead of client agents.
  • The v1 and v2 catalog APIs cannot run concurrently.
  • The Consul UI does not support multi-port services or the v2 catalog API in this release.
  • HCP Consul does not support multi-port services or the v2 catalog API in this release.

Significant Pull Requests

FEATURES:

  • Support custom watches on the Consul Controller framework. [GH-18439]
  • Windows: support consul connect envoy command on Windows [GH-17694]
  • acl: Add BindRule support for templated policies. Add new BindType: templated-policy and BindVar field for templated policy variables. [GH-18719]
  • acl: Add new acl.tokens.dns config field which specifies the token used implicitly during dns checks. [GH-17936]
  • acl: Added ACL Templated policies to simplify getting the right ACL token. [GH-18708]
  • acl: Adds a new ACL rule for workload identities [GH-18769]
  • acl: Adds workload identity templated policy [GH-19077]
  • api-gateway: Add support for response header modifiers on http-route configuration entry [GH-18646]
  • api-gateway: add retry and timeout filters [GH-18324]
  • cli: Add bind-var flag to consul acl binding-rule for templated policy variables. [GH-18719]
  • cli: Add consul acl templated-policy commands to read, list and preview templated policies. [GH-18816]
  • config-entry(api-gateway): (Enterprise only) Add GatewayPolicy to APIGateway Config Entry listeners
  • config-entry(api-gateway): (Enterprise only) Add JWTFilter to HTTPRoute Filters
  • dataplane: Allow getting bootstrap parameters when using V2 APIs [GH-18504]
  • gateway: (Enterprise only) Add JWT authentication and authorization to APIGateway Listeners and HTTPRoutes.
  • mesh: (Enterprise only) Adds rate limiting config to service-defaults [GH-18583]
  • xds: Add a built-in Envoy extension that appends OpenTelemetry Access Logging (otel-access-logging) to the HTTP Connection Manager filter. [GH-18336]
  • xds: Add support for patching outbound listeners to the built-in Envoy External Authorization extension. [GH-18336]

IMPROVEMENTS:

  • raft: upgrade raft-wal library version to 0.4.1. [GH-19314]
  • xds: Use downstream protocol when connecting to local app [GH-18573]
  • Windows: Integration tests for Consul Windows VMs [GH-18007]
  • acl: Use templated policy to generate synthetic policies for tokens/roles with node and/or service identities [GH-18813]
  • api: added CheckRegisterOpts to Agent API [GH-18943]
  • api: added Token field to ServiceRegisterOpts type in Agent API [GH-18983]
  • ca: Vault CA provider config no longer requires root_pki_path for secondary datacenters [GH-17831]
  • cli: Added -templated-policy, -templated-policy-file, -replace-templated-policy, -append-templated-policy, -replace-templated-policy-file, -append-templated-policy-file and -var flags for creating or updating tokens/roles. [GH-18708]
  • config: Add new tls.defaults.verify_server_hostname configuration option. This specifies the default value for any interfaces that support the verify_server_hostname option. [GH-17155]
  • connect: update supported envoy versions to 1.24.10, 1.25.9, 1.26.4, 1.27.0 [GH-18300]
  • ui: Use Community verbiage [GH-18560]

BUG FIXES:

  • api: add custom marshal/unmarshal for ServiceResolverConfigEntry.RequestTimeout so config entries that set this field can be read using the API. [GH-19031]
  • ca: ensure Vault CA provider respects Vault Enterprise namespace configuration. [GH-19095]
  • catalog api: fixes a bug with catalog api where filter query parameter was not working correctly for the /v1/catalog/services endpoint [GH-18322]
  • connect: (Enterprise only) Fix bug where incorrect service-defaults entries were fetched to determine an upstream's protocol whenever the upstream did not explicitly define the namespace / partition. When this bug occurs, upstreams would use the protocol from a service-default entry in the default namespace / partition, rather than their own namespace / partition.
  • connect: Fix bug where uncleanly closed xDS connections would influence connection balancing for too long and prevent envoy instances from starting. Two new configuration fields
    performance.grpc_keepalive_timeout and performance.grpc_keepalive_interval now exist to allow for configuration on how often these dead connections will be cleaned up. [GH-19339]
  • dev-mode: Fix dev mode has new line in responses. Now new line is added only when url has pretty query parameter. [GH-18367]
  • dns: (Enterprise only) Fix bug where sameness group queries did not correctly inherit the agent's partition.
  • docs: fix list of telemetry metrics [GH-17593]
  • gateways: Fix a bug where a service in a peered datacenter could not access an external node service through a terminating gateway [GH-18959]
  • server: (Enterprise Only) Fixed an issue where snake case keys were rejected when configuring the control-plane-request-limit config entry
  • telemetry: emit consul version metric on a regular interval. [GH-6876]
  • tlsutil: Default setting of ServerName field in outgoing TLS configuration for checks now handled by crypto/tls. [GH-17481]

v1.16.0

Compare Source

1.16.0 (June 26, 2023)

BREAKING CHANGES:

  • api: The /v1/health/connect/ and /v1/health/ingress/ endpoints now immediately return 403 "Permission Denied" errors whenever a token with insufficient service:read permissions is provided. Prior to this change, the endpoints returned a success code with an empty result list when a token with insufficient permissions was provided. [GH-17424]
  • peering: Removed deprecated backward-compatibility behavior.
    Upstream overrides in service-defaults will now only apply to peer upstreams when the peer field is provided.
    Visit the 1.16.x upgrade instructions for more information. [GH-16957]

SECURITY:

  • Bump Dockerfile base image to alpine:3.18. [GH-17719]
  • audit-logging: (Enterprise only) limit v1/operator/audit-hash endpoint to ACL token with operator:read privileges.

FEATURES:

  • api: (Enterprise only) Add POST /v1/operator/audit-hash endpoint to calculate the hash of the data used by the audit log hash function and salt.
  • cli: (Enterprise only) Add a new consul operator audit hash command to retrieve and compare the hash of the data used by the audit log hash function and salt.
  • cli: Adds new command - consul services export - for exporting a service to a peer or partition [GH-15654]
  • connect: (Consul Enterprise only) Implement order-by-locality failover.
  • mesh: Add new permissive mTLS mode that allows sidecar proxies to forward incoming traffic unmodified to the application. This adds AllowEnablingPermissiveMutualTLS setting to the mesh config entry and the MutualTLSMode setting to proxy-defaults and service-defaults. [GH-17035]
  • mesh: Support configuring JWT authentication in Envoy. [GH-17452]
  • server: (Enterprise Only) added server side RPC requests IP based read/write rate-limiter. [GH-4633]
  • server: (Enterprise Only) allow automatic license utilization

Configuration

📅 Schedule: Branch creation - "before 5am on Monday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

Need help?

You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.


Note

Medium Risk
Large dependency upgrades (including Consul, gRPC, and OpenTelemetry) can introduce subtle behavior changes even though code changes are minimal; main functional change is limited to test expectation updates.

Overview
Updates Go module/tooling versions and refreshes a broad set of dependencies (notably github.com/hashicorp/consul/api to v1.33.2, OpenTelemetry contrib packages, google.golang.org/grpc, golang.org/x/*, etc.), with corresponding go.sum churn; the ring example module is kept in sync.

Adjusts the OTel tracing test expectation to match updated semantic conventions by asserting rpc.system.name=grpc instead of rpc.system=grpc for the gRPC span attribute.

Written by Cursor Bugbot for commit bb75667. This will update automatically on new commits. Configure here.

@renovate-sh-app
Copy link
Copy Markdown
Contributor Author

renovate-sh-app bot commented Jan 19, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 26 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.0 -> 1.25.5
github.com/fatih/color v1.13.0 -> v1.16.0
github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.3 -> v2.27.7
github.com/hashicorp/go-hclog v0.14.1 -> v1.5.0
github.com/mattn/go-colorable v0.1.12 -> v0.1.13
github.com/mattn/go-isatty v0.0.14 -> v0.0.20
go.opentelemetry.io/contrib/bridges/prometheus v0.64.0 -> v0.65.0
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/prometheus v0.61.0 -> v0.62.0
go.opentelemetry.io/otel/exporters/stdout/stdoutlog v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/stdout/stdouttrace v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/log v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/sdk/log v0.15.0 -> v0.16.0
golang.org/x/crypto v0.46.0 -> v0.48.0
golang.org/x/mod v0.30.0 -> v0.33.0
golang.org/x/sys v0.40.0 -> v0.41.0
golang.org/x/text v0.32.0 -> v0.34.0
golang.org/x/tools v0.39.0 -> v0.42.0
google.golang.org/genproto/googleapis/api v0.0.0-20251202230838-ff82c1b0f217 -> v0.0.0-20260128011058-8636f8732409
google.golang.org/genproto/googleapis/rpc v0.0.0-20251202230838-ff82c1b0f217 -> v0.0.0-20260128011058-8636f8732409
File name: ring/example/local/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 35 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.0 -> 1.25.5
github.com/fatih/color v1.13.0 -> v1.16.0
github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.3 -> v2.27.7
github.com/hashicorp/consul/api v1.15.3 -> v1.33.2
github.com/hashicorp/go-hclog v0.14.1 -> v1.5.0
github.com/mattn/go-colorable v0.1.12 -> v0.1.13
github.com/mattn/go-isatty v0.0.14 -> v0.0.20
github.com/miekg/dns v1.1.69 -> v1.1.72
go.etcd.io/etcd/api/v3 v3.6.7 -> v3.6.8
go.etcd.io/etcd/client/pkg/v3 v3.6.7 -> v3.6.8
go.etcd.io/etcd/client/v3 v3.6.7 -> v3.6.8
go.opentelemetry.io/contrib/bridges/prometheus v0.64.0 -> v0.65.0
go.opentelemetry.io/contrib/exporters/autoexport v0.64.0 -> v0.65.0
go.opentelemetry.io/contrib/propagators/jaeger v1.39.0 -> v1.40.0
go.opentelemetry.io/contrib/samplers/jaegerremote v0.33.0 -> v0.34.0
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/prometheus v0.61.0 -> v0.62.0
go.opentelemetry.io/otel/exporters/stdout/stdoutlog v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/exporters/stdout/stdouttrace v1.39.0 -> v1.40.0
go.opentelemetry.io/otel/log v0.15.0 -> v0.16.0
go.opentelemetry.io/otel/sdk/log v0.15.0 -> v0.16.0
golang.org/x/mod v0.30.0 -> v0.33.0
golang.org/x/net v0.48.0 -> v0.50.0
golang.org/x/sys v0.40.0 -> v0.41.0
golang.org/x/text v0.32.0 -> v0.34.0
golang.org/x/tools v0.39.0 -> v0.42.0
google.golang.org/genproto/googleapis/api v0.0.0-20251202230838-ff82c1b0f217 -> v0.0.0-20260128011058-8636f8732409
google.golang.org/genproto/googleapis/rpc v0.0.0-20251202230838-ff82c1b0f217 -> v0.0.0-20260128011058-8636f8732409
google.golang.org/grpc v1.78.0 -> v1.79.1

@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch 5 times, most recently from e63276e to 2a54426 Compare January 25, 2026 09:10
@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch 3 times, most recently from c5e2215 to d675bb4 Compare January 30, 2026 00:11
Comment thread go.mod
@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch 9 times, most recently from 7977bc4 to f2f9c21 Compare February 5, 2026 21:15
@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch 3 times, most recently from b277bab to c457566 Compare February 9, 2026 13:06
Comment thread go.mod Outdated
@cursor

This comment has been minimized.

@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch from c457566 to 85b09fd Compare February 9, 2026 19:13
@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch from 85b09fd to 626c618 Compare February 10, 2026 16:05
@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch from 626c618 to 110497e Compare February 11, 2026 22:05
@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch 2 times, most recently from 3196221 to b23c9cc Compare February 13, 2026 10:06
Copy link
Copy Markdown

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Bugbot Autofix is ON. A Cloud Agent has been kicked off to fix the reported issue.

Comment thread go.mod
@cursor
Copy link
Copy Markdown

cursor bot commented Feb 13, 2026

Bugbot Autofix prepared fixes for 1 of the 1 bugs found in the latest run.

  • ✅ Fixed: Go version support unintentionally narrowed
    • Reverted the go directive from 1.25.5 back to 1.24.0 in both go.mod and ring/example/local/go.mod to maintain compatibility with Go 1.24.x as declared in the CI workflow.

Create PR

Or push these changes by commenting:

@cursor push 8569e81ff7
Preview (8569e81ff7)
diff --git a/go.mod b/go.mod
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,6 @@
 module github.com/grafana/dskit
 
-go 1.25.5
+go 1.24.0
 
 toolchain go1.25.7
 

diff --git a/ring/example/local/go.mod b/ring/example/local/go.mod
--- a/ring/example/local/go.mod
+++ b/ring/example/local/go.mod
@@ -1,6 +1,6 @@
 module github.com/grafana/dskit/ring/example/local
 
-go 1.25.5
+go 1.24.0
 
 toolchain go1.25.7

@renovate-sh-app renovate-sh-app bot force-pushed the deps-update/go-dependencies branch 6 times, most recently from 0f177f2 to 0eb402c Compare February 16, 2026 19:05
| datasource | package                                                                      | from                               | to                                 |
| ---------- | ---------------------------------------------------------------------------- | ---------------------------------- | ---------------------------------- |
| go         | github.com/hashicorp/consul/api                                              | v1.15.3                            | v1.33.2                            |
| go         | github.com/miekg/dns                                                         | v1.1.69                            | v1.1.72                            |
| go         | github.com/pires/go-proxyproto                                               | v0.8.1                             | v0.11.0                            |
| go         | go.etcd.io/etcd/api/v3                                                       | v3.6.7                             | v3.6.8                             |
| go         | go.etcd.io/etcd/client/pkg/v3                                                | v3.6.7                             | v3.6.8                             |
| go         | go.etcd.io/etcd/client/v3                                                    | v3.6.7                             | v3.6.8                             |
| go         | go.opentelemetry.io/contrib/exporters/autoexport                             | v0.64.0                            | v0.65.0                            |
| go         | go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc  | v0.64.0                            | v0.65.0                            |
| go         | go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace | v0.64.0                            | v0.65.0                            |
| go         | go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp                | v0.64.0                            | v0.65.0                            |
| go         | go.opentelemetry.io/contrib/propagators/jaeger                               | v1.39.0                            | v1.40.0                            |
| go         | go.opentelemetry.io/contrib/samplers/jaegerremote                            | v0.33.0                            | v0.34.0                            |
| go         | golang.org/x/exp                                                             | v0.0.0-20251125195548-87e1e737ad39 | v0.0.0-20260212183809-81e46e3db34a |
| go         | golang.org/x/net                                                             | v0.48.0                            | v0.50.0                            |
| go         | google.golang.org/grpc                                                       | v1.78.0                            | v1.79.1                            |

Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
Signed-off-by: Arve Knudsen <[email protected]>
@aknuds1 aknuds1 force-pushed the deps-update/go-dependencies branch from 0eb402c to 916e769 Compare February 17, 2026 08:54
@aknuds1 aknuds1 enabled auto-merge (squash) February 17, 2026 09:02
The otelgrpc v0.65.0 upgrade renamed the span attribute from
"rpc.system" to "rpc.system.name" per updated OTel semantic conventions.

Signed-off-by: Arve Knudsen <[email protected]>
@aknuds1 aknuds1 merged commit 0a26442 into main Feb 17, 2026
12 checks passed
@aknuds1 aknuds1 deleted the deps-update/go-dependencies branch February 17, 2026 09:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant