Skip to content

Commit be6707b

Browse files
authored
Prepare for release 1.8.4 (#4927)
* Prepare for release 1.8.4 * suppress cve
1 parent e184bbb commit be6707b

File tree

5 files changed

+43
-11
lines changed

5 files changed

+43
-11
lines changed

.release/security-scan.hcl

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,23 @@ container {
2828
"CVE-2024-58251",
2929
"CVE-2025-46394",
3030
"CVE-2025-47268",
31-
"CVE-2025-48964"
31+
"CVE-2025-48964",
32+
"CVE-2025-25724",
33+
"CVE-2024-57970",
34+
"CVE-2024-12797",
35+
"CVE-2025-3277",
36+
"CVE-2025-6965",
37+
"CVE-2025-6395",
38+
"CVE-2025-31115",
39+
"CVE-2025-32414",
40+
"CVE-2025-3576",
41+
"CVE-2025-5702",
42+
"CVE-2025-6021",
43+
"CVE-2024-4067",
44+
"CVE-2024-52533",
45+
"CVE-2024-40896",
46+
"CVE-2025-5914",
47+
"CVE-2025-8058"
3248
]
3349
}
3450
}

CHANGELOG.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,19 @@
1+
## 1.8.4 (November 5, 2023)
2+
3+
SECURITY:
4+
5+
* Updated AWS SDK dependencies and added CVE suppressions. Upgraded github.com/aws/aws-sdk-go from v1.38.63 to v1.55.8 in hack/aws-acceptance-test-cleanup utilities and suppressed CVEs:
6+
[GO-2022-0635](https://pkg.go.dev/vuln/GO-2022-0635) (AWS S3 Crypto SDK - in-band key negotiation issue)
7+
[GO-2022-0646](https://pkg.go.dev/vuln/GO-2022-0646) (AWS S3 Crypto SDK - CBC padding oracle issue)
8+
9+
These vulnerabilities affect only test cleanup utilities in unused S3 crypto components. They do not impact production consul-k8s deployments. [[GH-4870](https://github.com/hashicorp/consul-k8s/issues/4870)]
10+
* go: upgrade go version to 1.25.3 [[GH-4897](https://github.com/hashicorp/consul-k8s/issues/4897)]
11+
12+
IMPROVEMENTS:
13+
14+
* Consul-dataplane now includes both privileged and non-privileged binaries in the image. By default, all use cases use the non-privileged binaries (without NET_BIND_SERVICE). For Ingress, API, and Mesh Gateway use cases, if a privileged port is configured, the privileged binary (with NET_BIND_SERVICE capability) is automatically selected and used. [[GH-4745](https://github.com/hashicorp/consul-k8s/issues/4745)]
15+
* control-plane: updated endpoints controller to use podIP from endpoint object [[GH-4809](https://github.com/hashicorp/consul-k8s/issues/4809)]
16+
117
## 1.8.3 (September 30, 2025)
218

319
SECURITY:

charts/consul/Chart.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33

44
apiVersion: v2
55
name: consul
6-
version: 1.8.2-dev
7-
appVersion: 1.21-dev
6+
version: 1.8.4
7+
appVersion: 1.22.0
88
kubeVersion: ">=1.22.0-0"
99
description: Official HashiCorp Consul Chart
1010
home: https://www.consul.io
@@ -13,14 +13,14 @@ sources:
1313
- https://github.com/hashicorp/consul
1414
- https://github.com/hashicorp/consul-k8s
1515
annotations:
16-
artifacthub.io/prerelease: true
16+
artifacthub.io/prerelease: false
1717
artifacthub.io/images: |
1818
- name: consul
19-
image: docker.mirror.hashicorp.services/hashicorppreview/consul:1.21-dev
19+
image: hashicorp/consul:1.22.0
2020
- name: consul-k8s-control-plane
21-
image: docker.mirror.hashicorp.services/hashicorppreview/consul-k8s-control-plane:1.8-dev
21+
image: hashicorp/consul-k8s-control-plane:1.8.4
2222
- name: consul-dataplane
23-
image: docker.mirror.hashicorp.services/hashicorppreview/consul-dataplane:1.8-dev
23+
image: hashicorp/consul-dataplane:1.8.3
2424
- name: envoy
2525
image: envoyproxy/envoy:v1.25.11
2626
artifacthub.io/license: MPL-2.0

charts/consul/values.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ global:
6666
# image: "hashicorp/consul-enterprise:1.10.0-ent"
6767
# ```
6868
# @default: hashicorp/consul:<latest version>
69-
image: docker.mirror.hashicorp.services/hashicorppreview/consul:1.21-dev
69+
image: hashicorp/consul:1.22.0
7070

7171
# Array of objects containing image pull secret names that will be applied to each service account.
7272
# This can be used to reference image pull secrets if using a custom consul or consul-k8s-control-plane Docker image.
@@ -86,7 +86,7 @@ global:
8686
# image that is used for functionality such as catalog sync.
8787
# This can be overridden per component.
8888
# @default: hashicorp/consul-k8s-control-plane:<latest version>
89-
imageK8S: docker.mirror.hashicorp.services/hashicorppreview/consul-k8s-control-plane:1.8-dev
89+
imageK8S: hashicorp/consul-k8s-control-plane:1.8.4
9090

9191
# The image pull policy used globally for images controlled by Consul (consul, consul-dataplane, consul-k8s, consul-telemetry-collector).
9292
# One of "IfNotPresent", "Always", "Never", and "". Refer to https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy
@@ -793,7 +793,7 @@ global:
793793
# The name (and tag) of the consul-dataplane Docker image used for the
794794
# connect-injected sidecar proxies and mesh, terminating, and ingress gateways.
795795
# @default: hashicorp/consul-dataplane:<latest supported version>
796-
imageConsulDataplane: docker.mirror.hashicorp.services/hashicorppreview/consul-dataplane:1.8-dev
796+
imageConsulDataplane: hashicorp/consul-dataplane:1.8.3
797797

798798
# Configuration for running this Helm chart on the Red Hat OpenShift platform.
799799
# This Helm chart currently supports OpenShift v4.x+.

version/version.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ var (
2222
// A pre-release marker for the version. If this is "" (empty string)
2323
// then it means that it is a final release. Otherwise, this is a pre-release
2424
// such as "dev" (in development), "beta", "rc1", etc.
25-
VersionPrerelease = "dev"
25+
VersionPrerelease = ""
2626
)
2727

2828
// GetHumanVersion composes the parts of the version in a way that's suitable

0 commit comments

Comments
 (0)