From 37ac3e5290226cfcd00bbd54dbfaea1df06e8164 Mon Sep 17 00:00:00 2001 From: David Yu Date: Wed, 31 Aug 2022 08:30:01 -0700 Subject: [PATCH] CHANGELOG: formatting and missing links (#1467) --- CHANGELOG.md | 47 ++++++++++++++++++++++++----------------------- 1 file changed, 24 insertions(+), 23 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index a1689aa193..5e9af5f69f 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,45 +6,46 @@ FEATURES: * Consul CNI Plugin * CNI Plugin for Consul-k8s [[GH-1465](https://github.com/hashicorp/consul-k8s/pull/1456)] * Kubernetes 1.24 Support - * Add support for Kubernetes 1.24 where ServiceAccounts no longer have long term JWT tokens. [[GH-1431](https://github.com/hashicorp/consul-k8s/pull/1431)] + * Add support for Kubernetes 1.24 where ServiceAccounts no longer have long-term JWT tokens. [[GH-1431](https://github.com/hashicorp/consul-k8s/pull/1431)] * Upgrade kubeVersion in helm chart to support Kubernetes 1.21+. BREAKING CHANGES: * Kubernetes 1.24 Support - * Users deploying multiple services to the same Pod (multiport) on Kubernetes 1.24+ must also deploy a Kube Secret for each ServiceAccount associated with the Consul service. The name of the Secret must match the ServiceAccount name and be of type 'kubernetes.io/service-account-token' + * Users deploying multiple services to the same Pod (multiport) on Kubernetes 1.24+ must also deploy a Kubernetes Secret for each ServiceAccount associated with the Consul service. The name of the Secret must match the ServiceAccount name and be of type `kubernetes.io/service-account-token` [[GH-1431](https://github.com/hashicorp/consul-k8s/pull/1431)] -Example: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: svc1 - annotations: - kubernetes.io/service-account.name: svc1 -type: kubernetes.io/service-account-token ---- -apiVersion: v1 -kind: Secret -metadata: - name: svc2 - annotations: - kubernetes.io/service-account.name: svc2 -type: kubernetes.io/service-account-token -``` + Example: + + ```yaml + apiVersion: v1 + kind: Secret + metadata: + name: svc1 + annotations: + kubernetes.io/service-account.name: svc1 + type: kubernetes.io/service-account-token + --- + apiVersion: v1 + kind: Secret + metadata: + name: svc2 + annotations: + kubernetes.io/service-account.name: svc2 + type: kubernetes.io/service-account-token + ``` IMPROVEMENTS: * CLI: * Display clusters by their short names rather than FQDNs for the `proxy read` command. [[GH-1412](https://github.com/hashicorp/consul-k8s/pull/1412)] * Display a message when `proxy list` returns no results. [[GH-1412](https://github.com/hashicorp/consul-k8s/pull/1412)] * Display a warning when a user passes a field and table filter combination to `proxy read` where the given field is not present in any of the output tables. [[GH-1412](https://github.com/hashicorp/consul-k8s/pull/1412)] - * Extend the timeout for `consul-k8s proxy read` to establish a connection from 5s to 10s. - * Expand the set of Envoy Listener Filters that may be parsed and output to the Listeners table. + * Extend the timeout for `consul-k8s proxy read` to establish a connection from 5s to 10s. [[GH-1442](https://github.com/hashicorp/consul-k8s/pull/1442)] + * Expand the set of Envoy Listener Filters that may be parsed and output to the Listeners table. [[GH-1442](https://github.com/hashicorp/consul-k8s/pull/1442)] BUG FIXES: * Helm * API Gateway: Configure ACL auth for controller correctly when deployed in secondary datacenter with federation enabled [[GH-1462](https://github.com/hashicorp/consul-k8s/pull/1462)] * CLI - * Fix issue where SNI filters for Terminating Gateways showed up as blank lines. + * Fix issue where SNI filters for Terminating Gateways showed up as blank lines. [[GH-1442](https://github.com/hashicorp/consul-k8s/pull/1442)] ## 0.47.1 (August 12, 2022)