Skip to content

Commit

Permalink
repo: Release v1.28.2
Browse files Browse the repository at this point in the history
**Summary of changes**:

- Patch nghttp2 to resolve [CVE-2024-30255](GHSA-j654-3ccm-vfmm)
- Assorted fixes

**Docker images**:
    https://hub.docker.com/r/envoyproxy/envoy/tags?page=1&name=v1.28.2
**Docs**:
    https://www.envoyproxy.io/docs/envoy/v1.28.2/
**Release notes**:
    https://www.envoyproxy.io/docs/envoy/v1.28.2/version_history/v1.28/v1.28.2
**Full changelog**:
    v1.28.1...v1.28.2

Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
  • Loading branch information
phlax committed Apr 4, 2024
1 parent 0f7336b commit aecedd8
Show file tree
Hide file tree
Showing 8 changed files with 38 additions and 13 deletions.
2 changes: 1 addition & 1 deletion VERSION.txt
@@ -1 +1 @@
1.28.2-dev
1.28.2
13 changes: 13 additions & 0 deletions changelogs/1.26.8.yaml
@@ -0,0 +1,13 @@
date: April 4, 2024

bug_fixes:
- area: http2
change: |
Update nghttp2 to resolve CVE-2024-30255 (https://github.com/envoyproxy/envoy/security/advisories/GHSA-j654-3ccm-vfmm).
new_features:
- area: google_grpc
change: |
Added an off-by-default runtime flag
``envoy.reloadable_features.google_grpc_disable_tls_13`` to disable TLSv1.3
usage by gRPC SDK for ``google_grpc`` services.
20 changes: 20 additions & 0 deletions changelogs/1.27.4.yaml
@@ -0,0 +1,20 @@
date: April 4, 2024

behavior_changes:
- area: http2
change: |
Discard the ``Host`` header if the ``:authority`` header was received to bring Envoy into compliance with
https://www.rfc-editor.org/rfc/rfc9113#section-8.3.1 This behavioral change can be reverted by setting runtime flag
``envoy.reloadable_features.http2_discard_host_header`` to false.
bug_fixes:
- area: http2
change: |
Update nghttp2 to resolve CVE-2024-30255 (https://github.com/envoyproxy/envoy/security/advisories/GHSA-j654-3ccm-vfmm).
new_features:
- area: google_grpc
change: |
Added an off-by-default runtime flag
``envoy.reloadable_features.google_grpc_disable_tls_13`` to disable TLSv1.3
usage by gRPC SDK for ``google_grpc`` services.
10 changes: 1 addition & 9 deletions changelogs/current.yaml
@@ -1,37 +1,29 @@
date: Pending
date: April 4, 2024

behavior_changes:
# *Changes that are expected to cause an incompatibility if applicable; deployment changes are likely required*
- area: http2
change: |
Discard the ``Host`` header if the ``:authority`` header was received to bring Envoy into compliance with
https://www.rfc-editor.org/rfc/rfc9113#section-8.3.1 This behavioral change can be reverted by setting runtime flag
``envoy.reloadable_features.http2_discard_host_header`` to false.
minor_behavior_changes:
# *Changes that may cause incompatibilities for some users, but should not for most*
- area: http
change: |
Enable obsolete line folding in BalsaParser (for behavior parity with http-parser, the
previously used HTTP/1 parser).
bug_fixes:
# *Changes expected to improve the state of the world and are unlikely to have negative effects*
- area: jwt_authn
change: |
Fixed JWT extractor, which concatenated headers with a comma, resultig in invalid tokens.
- area: http2
change: |
Update nghttp2 to resolve CVE-2024-30255 (https://github.com/envoyproxy/envoy/security/advisories/GHSA-j654-3ccm-vfmm).
removed_config_or_runtime:
# *Normally occurs at the end of the* :ref:`deprecation period <deprecated>`

new_features:
- area: google_grpc
change: |
Added an off-by-default runtime flag
``envoy.reloadable_features.google_grpc_disable_tls_13`` to disable TLSv1.3
usage by gRPC SDK for ``google_grpc`` services.
deprecated:
Binary file modified docs/inventories/v1.26/objects.inv
Binary file not shown.
Binary file modified docs/inventories/v1.27/objects.inv
Binary file not shown.
Binary file modified docs/inventories/v1.28/objects.inv
Binary file not shown.
6 changes: 3 additions & 3 deletions docs/versions.yaml
Expand Up @@ -19,6 +19,6 @@
"1.23": 1.23.12
"1.24": 1.24.12
"1.25": 1.25.11
"1.26": 1.26.7
"1.27": 1.27.3
"1.28": 1.28.0
"1.26": 1.26.8
"1.27": 1.27.4
"1.28": 1.28.1

0 comments on commit aecedd8

Please sign in to comment.