Skip to content

Commit 5270456

Browse files
authored
[release/v1.6] v1.6.0-rc.1 release notes (#7392)
Signed-off-by: Rudrakh Panigrahi <[email protected]>
1 parent 63882d7 commit 5270456

File tree

3 files changed

+69
-48
lines changed

3 files changed

+69
-48
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
v1.5.4
1+
v1.6.0-rc.1

release-notes/current.yaml

Lines changed: 0 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -2,61 +2,14 @@ date: Pending
22

33
# Changes that are expected to cause an incompatibility with previous versions, such as deletions or modifications to existing APIs.
44
breaking changes: |
5-
ALPNProtocols in EnvoyProxy Backend TLS setting use [h2, http/1.1] if not set.
6-
When a Backend resource specifies TLS settings and SNI is not specified or a BackendTLSPolicy is not attached to it, the value of upstream TLS SNI is determined by the HTTP Host header.
7-
When a Backend resource specifies TLS settings and SNI is not specified or a BackendTLSPolicy is not attached to it, the upstream certificate is validated for DNS SAN matching the SNI value sent.
8-
When a MirrorPolicy is used, the shadow host suffix is not appended to the mirrored cluster name.
9-
When running `egctl experimental collect`, SDS will not be dumped, you can enable it by adding `--sds true`.
10-
When setting the 'consecutiveGatewayFailure' will 'enforcingConsecutiveGatewayFailure set to 100.
11-
When the OIDC provider issues a refresh token, Envoy Gateway will now use it to automatically obtain new access and ID tokens when the current ones expire. To keep the previous behavior (not using refresh tokens), set `refreshToken` (see https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec) to false in the OIDC authentication configuration.
125
136
# Updates addressing vulnerabilities, security flaws, or compliance requirements.
147
security updates: |
158
169
# New features or capabilities added in this release.
1710
new features: |
18-
Added support for mTLS configuration for ExtensionServer.
19-
Added support for RetryPolicy in gRPC ExtAuth callouts via SecurityPolicy backend settings fields.
20-
Added support for late response headers in ClientTrafficPolicy.
21-
Added max connection/stream duration and max requests per connection to ClientTrafficPolicy.
22-
Added PercentageEnabled to ZoneAware lb config.
23-
Added cacheDuration for remoteJWKS in SecurityPolicy.
24-
Added support for DisableTokenEncryption in OIDC authn to disable encryption of ID and access tokens stored in cookies.
25-
Added support for OCSP stapling in the listener TLS certificates.
26-
Added support for per-backend client TLS settings in Backend resources. This allows configuring the client certificate as well as TLS protocol parameters such as ciphers, TLS versions, and ALPN protocols on a per-backend basis.
27-
Added support for returning 503 responses when no valid backend endpoints exist.
28-
Added support for CSRFTokenTTL in OIDC authn to configure the lifetime of the CSRF token used during the OAuth2 authorization code flow.
29-
Added support for http2 stream timeout
30-
Added support for Envoy PreconnectPolicy in BackendTrafficPolicy.
31-
Added support for binaryData in ConfigMap referenced by HTTPRouteFilter for direct response.
32-
Added support PDB for Ratelimit service.
33-
Auto-generates TLS certificates in host mode when they don't exist.
34-
Added support for allowing OPTIONS method implicitly when HTTPRoute CORS filter is used.
35-
Added support rate limit based on path and method in BackendTrafficPolicy.
36-
Added support for Certificate Revocation Lists (CRLs) in ClientTrafficPolicy.
3711
3812
bug fixes: |
39-
Fixed %ROUTE_KIND% operator to be lower-cased when used by clusterStatName in EnvoyProxy API.
40-
Fixed maxAcceptPerSocketEvent being ignored in ClientTrafficPolicy.
41-
Fixed the topologyInjectorDisabled and the local cluster was not defined.
42-
Fixed log formatting of improper key-value pairs to avoid DPANIC in controller-runtime logger.
43-
Fixed handling of context-related transient errors to prevent incorrect state reconciliation and unintended behavior.
44-
Fixed the controller cannot read the EnvoyProxy attached gatewayclass only.
45-
Fixed adding metadata for proxyService and oidc xds clusters.
46-
Fixed handling of millisecond-level retry durations and token TTLs in OIDC authn.
47-
Fixed indexer and controller crashing when BackendTrafficPolicy has a redirect response override.
48-
Fixed Lua validator log level to be suppressed by default.
49-
Fixed ProxyTopologyInjector cache sync race condition that caused injection failures
50-
Fixed validation for grpc routes with extension ref filters.
51-
Fixed service account token handling in GatewayNamespaceMode to use SDS for properly refreshing expired token.
52-
Fixed handling of regex meta characters in prefix match replace for URL rewrite.
53-
Disabled the default emission of `x-envoy-ratelimited` headers from the rate limit filter; re-enable with the `enableEnvoyHeaders` setting in ClientTrafficPolicy.
54-
Fixed a nil pointer panic in the XDS translator when building API key authentication filter configurations with `sanitize` enabled and no `forwardClientIDHeader` set.
55-
Truncated Gateway API status condition messages to stay within Kubernetes limits and prevent update failures.
56-
Fixed an issue in EnvoyPatchPolicy where it didn't match the target Gateway/GatewayClass due to an incorrect name reference.
57-
Fixed certificate SAN overlap detection in gateway listeners.
58-
Fixed description and translation behavior for PreserveXRequestID
59-
Fixed race condition in proxy context map used in host mode.
6013
6114
# Enhancements that improve performance.
6215
performance improvements: |

release-notes/v1.6.0-rc.1.yaml

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
date: October 31, 2025
2+
3+
# Changes that are expected to cause an incompatibility with previous versions, such as deletions or modifications to existing APIs.
4+
breaking changes: |
5+
ALPNProtocols in EnvoyProxy Backend TLS settings now default to [h2, http/1.1] when not explicitly configured.
6+
When a Backend resource specifies TLS settings and SNI is not specified or a BackendTLSPolicy is not attached to it, the upstream TLS SNI value is now automatically determined from the HTTP Host header.
7+
When a Backend resource specifies TLS settings and SNI is not specified or a BackendTLSPolicy is not attached to it, upstream certificate validation now requires DNS SAN to match the SNI value that is sent.
8+
When a MirrorPolicy is used, the shadow host suffix is no longer automatically appended to the mirrored cluster name.
9+
When running `egctl experimental collect`, SDS (Secret Discovery Service) data is no longer included by default. To include SDS data, enable it by adding the `--sds true` flag.
10+
When setting `consecutiveGatewayFailure`, `enforcingConsecutiveGatewayFailure` is automatically set to 100.
11+
When the OIDC provider issues a refresh token, Envoy Gateway will now automatically use it to refresh access and ID tokens when they expire. To maintain the previous behavior (not using refresh tokens), set `refreshToken` to false in the OIDC authentication configuration. See https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec for details.
12+
13+
# Updates addressing vulnerabilities, security flaws, or compliance requirements.
14+
security updates: |
15+
16+
# New features or capabilities added in this release.
17+
new features: |
18+
Added support for mutual TLS (mTLS) configuration for ExtensionServer to enable secure communication between Envoy Gateway and extension servers.
19+
Added support for configuring RetryPolicy in gRPC External Authentication callouts via SecurityPolicy backend settings fields, allowing fine-grained control over retry behavior for authentication requests.
20+
Added support for configuring late response headers in ClientTrafficPolicy, enabling headers to be added to responses after the response body has started.
21+
Added support for configuring maximum connection duration, stream duration, and maximum requests per connection in ClientTrafficPolicy to provide better control over connection lifecycle and resource usage.
22+
Added PercentageEnabled configuration option to ZoneAware load balancing configuration, enabling gradual rollout of zone-aware routing.
23+
Added cacheDuration configuration for remoteJWKS (Remote JSON Web Key Set) in SecurityPolicy, allowing customization of JWKS caching behavior for improved performance.
24+
Added support for DisableTokenEncryption in OIDC authentication to disable encryption of ID and access tokens stored in cookies, providing flexibility for environments with alternative security mechanisms.
25+
Added support for OCSP (Online Certificate Status Protocol) stapling in listener TLS certificates, improving TLS handshake performance and enabling real-time certificate revocation checking.
26+
Added support for per-backend client TLS settings in Backend resources, enabling configuration of client certificates, ciphers, TLS versions, and ALPN protocols on a per-backend basis for granular TLS control.
27+
Added support for returning HTTP 503 Service Unavailable responses when no valid backend endpoints exist, improving observability and user experience during service outages.
28+
Added support for CSRFTokenTTL configuration in OIDC authentication to customize the lifetime of CSRF tokens used during the OAuth2 authorization code flow, enhancing security and session management.
29+
Added support for HTTP/2 stream timeout configuration, providing control over stream-level timeouts in HTTP/2 connections.
30+
Added support for Envoy PreconnectPolicy in BackendTrafficPolicy, enabling proactive connection establishment to backend services for reduced latency.
31+
Added support for binaryData in ConfigMap referenced by HTTPRouteFilter for direct response, allowing binary content to be served directly from ConfigMaps.
32+
Added support for PodDisruptionBudget (PDB) configuration for the rate limit service, improving availability during cluster maintenance operations.
33+
Added automatic generation of TLS certificates in host mode when they do not exist, simplifying deployment and reducing manual certificate management overhead.
34+
Added automatic implicit support for OPTIONS HTTP method when HTTPRoute CORS filter is used, simplifying CORS configuration for preflight requests.
35+
Added support for rate limiting based on HTTP path and method in BackendTrafficPolicy, enabling more granular rate limiting policies.
36+
Added support for Certificate Revocation Lists (CRLs) in ClientTrafficPolicy, enabling certificate revocation checking for enhanced security.
37+
38+
bug fixes: |
39+
Fixed %ROUTE_KIND% operator to be properly lower-cased when used by clusterStatName in EnvoyProxy API, ensuring consistent metric naming conventions.
40+
Fixed maxAcceptPerSocketEvent configuration being ignored in ClientTrafficPolicy, now correctly applying the configured value to limit connections accepted per socket event.
41+
Fixed an issue where topologyInjectorDisabled was enabled but the local cluster was not defined, causing configuration inconsistencies.
42+
Fixed log formatting of improper key-value pairs to prevent DPANIC errors in controller-runtime logger, improving stability and log readability.
43+
Fixed handling of context-related transient errors to prevent incorrect state reconciliation and unintended behavior during API server communication interruptions.
44+
Fixed an issue where the controller could not read EnvoyProxy resources that are attached only to GatewayClass, improving resource discovery and reconciliation.
45+
Fixed adding metadata for proxyService and OIDC xDS clusters, ensuring proper metadata propagation for service discovery and authentication.
46+
Fixed handling of millisecond-level retry durations and token TTLs in OIDC authentication, ensuring precise time-based configuration values are correctly processed.
47+
Fixed indexer and controller crashing when BackendTrafficPolicy has a redirect response override, improving stability during policy configuration updates.
48+
Fixed Lua validator log level to be suppressed by default, reducing log noise and improving performance during Lua script validation.
49+
Fixed ProxyTopologyInjector cache sync race condition that caused injection failures, ensuring reliable topology injection during concurrent operations.
50+
Fixed validation for gRPC routes with extension reference filters, ensuring proper validation and processing of gRPC routes with extension integrations.
51+
Fixed service account token handling in GatewayNamespaceMode to use SDS (Secret Discovery Service) for properly refreshing expired tokens, ensuring continuous service availability.
52+
Fixed handling of regex meta characters in prefix match replace for URL rewrite, ensuring special characters are correctly processed during URL transformations.
53+
Disabled the default emission of `x-envoy-ratelimited` headers from the rate limit filter to reduce header bloat. Re-enable with the `enableEnvoyHeaders` setting in ClientTrafficPolicy if needed.
54+
Fixed a nil pointer panic in the XDS translator when building API key authentication filter configurations with `sanitize` enabled and no `forwardClientIDHeader` set, improving stability and error handling.
55+
Truncated Gateway API status condition messages to stay within Kubernetes limits and prevent update failures, ensuring reliable status updates for large message payloads.
56+
Fixed an issue in EnvoyPatchPolicy where it didn't match the target Gateway or GatewayClass due to an incorrect name reference, ensuring proper policy application.
57+
Fixed certificate SAN (Subject Alternative Name) overlap detection in gateway listeners, improving TLS certificate validation and error reporting.
58+
Fixed description and translation behavior for PreserveXRequestID configuration, ensuring consistent request ID preservation across HTTP requests.
59+
Fixed race condition in proxy context map used in host mode, preventing concurrent access issues and ensuring reliable proxy context management.
60+
61+
# Enhancements that improve performance.
62+
performance improvements: |
63+
64+
# Deprecated features or APIs.
65+
deprecations: |
66+
67+
# Other notable changes not covered by the above sections.
68+
Other changes: |

0 commit comments

Comments
 (0)