Skip to content

Releases: solo-io/gloo

v1.18.0-beta29

07 Nov 21:39
ea468b6
Compare
Choose a tag to compare

This release contained no user-facing changes.

v1.18.0-beta28

07 Nov 22:40
94d02de
Compare
Choose a tag to compare

This release contained no user-facing changes.

v1.18.0-beta27

08 Nov 00:04
c3337f7
Compare
Choose a tag to compare

Dependency Bumps

  • solo-io/envoy-gloo has been upgraded to 1.31.2-patch1.

New Features

  • Add an API to allow configuring Gemini as AI upstream. (hhttps://github.com/solo-io/solo-projects/issues/7030)
  • Add the initial API for the AI Prompt Guard Webhook. (solo-io/solo-projects#6983)
  • Updated the datadog tracer config proto to match envoy v1.31. New fields include collector_hostname and remote_config. Remote config can now be configured or disabled completely. (#10145)

v1.18.0-beta26

08 Nov 01:24
d92d3d2
Compare
Choose a tag to compare

Fixes

  • Previously, the controller would only watch Gateway objects for generation field changes which is not updated when annotations change. Since Gateway reconciliation should be triggered when the gateway.gloo.solo.io/gateway-parameters-name annotation is added, removed, or modified, the predicate was updated to check for changes in either the generation field or the annotations. (#10099)

v1.15.34

08 Nov 01:40
665fecf
Compare
Choose a tag to compare

This release contained no user-facing changes.

v1.18.0-beta25

08 Nov 01:46
a1dc990
Compare
Choose a tag to compare

Helm Changes

  • Add value to enable full Envoy validation after translation. This functionality is disabled by default but can be enabled with gateway.validation.fullEnvoyValidation=true. (#5720)

New Features

  • Adds feature to utilize Envoy's validate mode to validate all config during translation. This will be helpful in catching issues which Gloo translation cannot or otherwise does not view as errors before the config gets served to Envoy. (#5720)

Fixes

  • Updates the Gateway API CRDs to from v1.0.0-rc1 to v1.0.0. (#10115)
  • Changes to downgrade the level of strictness added in 1.17.8 for TLS secret validation. We still validate several pieces of the cert but also scrub down to usable bits. This means we avoid envoy nacks while allowing more non-useful or functional info in our TLS secrets. This means we are RFC compliant but it may mean that there could exist some cert data in an edge case which we will elide from envoy but previously would be nacked. (solo-io/solo-projects#6772)

v1.17.14

08 Nov 01:57
22eddad
Compare
Choose a tag to compare

This release contained no user-facing changes.

v1.17.13

08 Nov 02:14
d9f563c
Compare
Choose a tag to compare

This release contained no user-facing changes.

v1.17.12

08 Nov 02:19
33d3991
Compare
Choose a tag to compare

Fixes

  • Changes to downgrade the level of strictness added in 1.17.8 for TLS secret validation. We still validate several pieces of the cert but also scrub down to usable bits. This means we avoid envoy nacks while allowing more non-useful or functional info in our TLS secrets. This means we are RFC compliant but it may mean that there could exist some cert data in an edge case which we will elide from envoy but previously would be nacked. (solo-io/solo-projects#6772)

v1.16.22

08 Nov 02:39
fe8ba7d
Compare
Choose a tag to compare

This release contained no user-facing changes.