forked from kgateway-dev/kgateway
-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update envoy-gloo to 1.32.3-patch2 (#10595)
Co-authored-by: changelog-bot <changelog-bot> Co-authored-by: Nathan Fudenberg <[email protected]> Co-authored-by: Sam Heilbron <[email protected]>
- Loading branch information
1 parent
d4fa277
commit e1a5574
Showing
2 changed files
with
13 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
changelog: | ||
- type: DEPENDENCY_BUMP | ||
dependencyOwner: solo-io | ||
dependencyRepo: envoy-gloo | ||
dependencyTag: v1.32.3-patch2 | ||
issueLink: https://github.com/solo-io/solo-projects/issues/7608 | ||
- type: BREAKING_CHANGE | ||
issueLink: https://github.com/solo-io/solo-projects/issues/7608 | ||
description: >- | ||
The default configuration of Envoy will continue to trust internal addresses while in the future it will not trust them by default. If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary x-envoy headers) please explicitly include those addresses or CIDR ranges into [internal_address_config](https://docs.solo.io/gloo-edge/latest/reference/api/github.com/solo-io/gloo/projects/gloo/api/v1/options/hcm/hcm.proto.sk/#internaladdressconfig). You can turn up or test the upcoming internal address defaults by setting runtime guard envoy.reloadable_features.explicit_internal_address_config to true. | ||
For more information, see: https://github.com/envoyproxy/envoy/pull/36221 |