./sysutils/consul, Tool for service discovery, monitoring and configuration

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 0.8.5, Package name: consul-0.8.5, Maintainer: filip

Consul is a tool for service discovery and configuration. Consul
is distributed, highly available, and extremely scalable.

Required to build:
[lang/go] [pkgtools/cwrappers]

Master sites:

SHA1: d37fec9db54109a0638b578e4681ca41dfb05a0c
RMD160: c99cf5ee7493eb4b1db0f624e9025bda021c8506
Filesize: 6474.667 KB

Version history: (Expand)

CVS history: (Expand)

   2017-07-03 23:25:03 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
Update sysutils/consul to 0.8.5.


- agent: Parse values given to `?passing` for health endpoints.
- agent: The default value of `-disable-host-node-id` has been changed
  from false to true.


- agent: Added a `-disable-keyring-file` option to prevent writing
  keyring data to disk.
- agent: Added automatic notify to systemd on Linux after LAN join is
  complete, which makes it easier to order services that depend on
  Consul being available.
- agent: The `http_api_response_headers` config has been moved into a
  new `http_config` struct, so the old form is still supported but is
- dns: Added support for EDNS(0) size adjustments if set in the
  request frame.
- server: Added a startup warning for servers when expecting to
  bootstrap with an even number of nodes.
- agent: (Consul Enterprise) Added support for non rotating,
  statically named snapshots for S3 snapshots using the snapshot


- agent: Fixed a regression where configuring -1 for the port was no
  longer disabling the DNS server.
- agent: Fix `consul leave` shutdown race.
- agent: Show a better error message than 'EOF' when attempting to
  join with the wrong gossip key.
- agent: Fixed an issue where the `Method` and `Header` features of
  HTTP health checks were not being applied.
- agent: Fixed an issue where internally-configured watches were not
  working because of an incorrect protocol error, and unified internal
  watch handling during reloads of the Consul agent.
- server: Fixed an issue where the leader could return stale data
  duing queries as it is starting up.
   2017-06-13 08:09:25 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
## 0.8.4 (June 9, 2017)

- agent: Added a method for transitioning to gossip encryption on an
  existing cluster
- agent: Added a method for transitioning to TLS on an existing cluster
- agent: Added support for RetryJoin on Azure
- agent: (Consul Enterprise) Added AWS server side encryption support
  for S3 snapshots using the snapshot agent.

- agent: Added a check which prevents advertising or setting a service
  to a zero address (``, `[::]`, `::`).
- agent: Allow binding to any public IPv6 address with `::`
- agent: Removed SCADA-related code for Atlas and deprecated all
  Atlas-related configuration options.
- agent: Added support for custom check id and name when registering
  checks along with a service.
- agent: Updated go-sockaddr library to add support for new helper
  functions in bind address templates (`GetPrivateIPs`, `GetPublicIPs`),
  new math functions, and to pick up fixes for issues with detecting
  addresses on multi-homed hosts.
- agent: Watches now reset their index back to zero after an error, or
  if the index goes backwards, which allows watches to recover after a
  server restart with fresh state.
- agent: HTTP health checks now upport custom method and headers.
- agent: Increased the graceful leave timeout from 5 to 15 seconds.
- agent: Added additional logging when the agent handles signals and
  when it exits.
- build: Added support for linux/arm64 binaries.
- build: Consul now builds with Go 1.8.3.
- ui: Added a sticky scroll to the KV side panel so the KV edit box
  always stays in place.

- agent: Added defensive code to prevent agents from infecting the
  network coordinates with `NaN` or `Inf` values, and added code to
  clean up in environments where this has happened.
- api: Added code to always read from the body of a request so that
  connections will always be returned to the pool.
- build: Added a vendor fix to allow compilation on Illumos.
- cli: Fixed an issue where `consul exec` would return a 0 exit code,
  even when there were nodes that didn't respond.
   2017-05-15 12:24:30 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
Update sysutils/consul to 0.8.3.

- agent: Fixed an issue where NAT-configured agents with a non-routable
  advertise address would refuse to make RPC connections to Consul
  servers. This was a regression related to GH-2822 in Consul 0.8.2.
   2017-05-10 19:15:25 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
Update sysutils/consul to 0.8.2


- api: HttpClient now defaults to nil in the client config and will be
  generated if left blank. A NewHttpClient function has been added for
  creating an HttpClient with a custom Transport or TLS config.


- agent: Added an error at agent startup time if both -ui and -ui-dir
  are configured together.
- agent: Added the datacenter of a node to the catalog, health, and
  query API endpoints which contain a Node structure.
- agent: Added the ca_path, tls_cipher_suites, and
  tls_prefer_server_cipher_suites options to give more flexibility
  around configuring TLS.
- agent: Reduced the timeouts for the -dev server mode so that the
  development server starts up almost instantly.
- agent: Added verify_incoming_rpc and verify_incoming_https options
  for more granular control over incoming TLS enforcement.
- agent: Use bind address as source for outgoing connections.
- api: Added the ACL replication status endpoint to the Go API client
- cli: Added Raft protocol version to output of operator raft
  list-peers command.
- ui: Added optional JSON validation when editing KV entries in the
  web UI.
- ui: Updated ACL guide links and made guides open in a new tab.


- server: Fixed a panic when the tombstone garbage collector was
- server: Fixed a panic in Autopilot that could occur when a node is
  elected but cannot complete leader establishment and steps back
- server: Added a new peers.json format that allows outage recovery
  when using Raft protocol version 3 and higher. Previously, you'd
  have to set the Raft protocol version back to 2 in order to manually
  recover a cluster.
- ui: Add and update favicons
   2017-04-18 17:47:18 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
Update sysutils/consul to 0.8.1.

- agent: Node IDs derived from host information are now hashed to
  prevent things like common server hardware from generating IDs with
  a common prefix across nodes.
- agent: Added new -disable-host-node-id CLI flag and
  disable_host_node_id config option to the Consul agent to prevent it
  from using information from the host when generating a node ID.
- agent: Removed useless "==> Caught signal: broken pipe" logging
  since that often results from problems sending telemetry or broken
  incoming client connections; operators don't need to be alerted to
- cli: Added TLS options for setting the client/CA certificates to use
  when communicating with Consul.
- build: Consul is now built with Go 1.8.1.
- ui: Updates Consul assets to new branding.

- api: Added missing Raft index fields to AgentService and Node
- server: Fixed an issue where flood joins would not work with IPv6
- server: Fixed an issue where electing a 0.8.x leader during an
  upgrade would cause a panic in older servers.
- server: Fixed an issue where tracking of leadership changes could
  become incorrect when changes occurred very rapidly.
- server: Fixed a panic when checking ACLs on a session that doesn't
   2017-04-13 17:12:07 by Benny Siegert | Files touched by this commit (39) | Package updated
Log message:
Revbump all Go packages after the Go 1.8.1 update.
   2017-04-06 21:25:18 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
Update sysutils/consul to 0.8.0


- Command-Line Interface RPC Deprecation: The RPC client interface has
  been removed.
- Version 8 ACLs Are Now Opt-Out: The acl_enforce_version_8
  configuration now defaults to true to enable full version 8 ACL
  support by default.
- Remote Exec Is Now Opt-In: The default for disable_remote_exec was
  changed to "true", so now operators need to opt-in to having agents
  support running commands remotely via consul exec.
- Raft Protocol Compatibility: When upgrading to Consul 0.8.0 from a
  version lower than 0.7.0, users will need to set the -raft-protocol
  option to 1 in order to maintain backwards compatibility with the old
  servers during the upgrade.


- Autopilot: A set of features has been added to allow for automatic
  operator-friendly management of Consul servers.
- Dead Server Cleanup: Dead servers will periodically be cleaned up and
  removed from the Raft peer set
- Server Health Checking: An internal health check has been added to
  track the stability of servers.
- New Server Stabilization: When a new server is added to the cluster,
  there will be a waiting period where it must be healthy and stable for
  a certain amount of time before being promoted to a full, voting member.
- Advanced Redundancy: (Consul Enterprise) A new -non-voting-server
  option flag has been added for Consul servers to configure a server
  that does not participate in the Raft quorum.
- Upgrade Orchestration: (Consul Enterprise) Autopilot will
  automatically orchestrate an upgrade strategy for Consul servers
- Network Areas: (Consul Enterprise) A new capability has been added
  which allows operators to define network areas that join together two
  Consul datacenters.
- WAN Soft Fail: Request routing between servers in the WAN is now more
  robust by treating Serf failures as advisory but not final.
- WAN Join Flooding: A new routine was added that looks for Consul
  servers in the LAN and makes sure that they are joined into the WAN as
- Validate command: To provide consistency across our products, the
  configtest command has been deprecated and replaced with the validate


- agent: Fixed a missing case where gossip would stop flowing to dead
  nodes for a short while.
- agent: Changed agent to seed Go's random number generator.
- agent: Serf snapshots no longer have the executable bit set on the
- agent: Consul is now built with Go 1.8.
- agent: Updated aws-sdk-go version (used for EC2 auto join) for Go 1.8
- agent: User-supplied node IDs are now normalized to lower-case.
- agent: Added checks to enforce uniqueness of agent node IDs at cluster
  join time and when registering with the catalog.
- cli: Standardized handling of CLI options for connecting to the Consul
- cli: Updated go-cleanhttp library for better HTTP connection handling
  between CLI commands and the Consul agent
- cli: The operator raft subcommand has had its two modes split into the
  list-peers and remove-peer subcommands.
- cli: Added an -id flag to the operator raft remove-peer command to
  allow removing a peer by ID.
- dns: Allows the .service tag to be optional in RFC 2782 lookups.
- server: Changed the internal EnsureRegistration RPC endpoint to
  prevent registering checks that aren't associated with the top-level
  node being registered.


- agent: Fixed an issue with consul watch not working when http was
  listening on a unix socket.
- agent: Fixed an issue where checks and services could not sync
  deregister operations back to the catalog when version 8 ACL support
  is enabled.
- agent: Fixed an issue where agents could use the ACL token registered
  with a service when registering checks for the same service that were
  registered with a different ACL token.
- cli: Fixed consul kv commands not reading the CONSUL_HTTP_TOKEN
  environment variable.
- cli: Fixed an issue where prefixing an address with a protocol (such
  as 'http://' or 'https://') in -http-addr or CONSUL_HTTP_ADDR would
  give an error.
- cli: Fixed an issue where error messages would get printed to stdout
  instead of stderr.
- server: Fixed an issue with version 8 ACLs where servers couldn't
  deregister nodes from the catalog during reconciliation.
- server: Fixed an issue where servers could temporarily roll back
  changes to a node's metadata or tagged addresses when making updates
  to the node's health checks.
- server: Fixed an issue where the service name consul was not subject
  to service ACL policies with version 8 ACLs enabled.
   2017-02-17 16:22:03 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
Update sysutils/consul to 0.7.5.

- server: Fixed a rare but serious issue where Consul servers could
  panic when performing a large delete operation followed by a specific
  sequence of other updates to related parts of the state store (affects
  KV, sessions, prepared queries, and the catalog).