Commit Graph

81 Commits

Author SHA1 Message Date
Andrew Seigner f6e8d3a7ae
Add release notes for stable-2.5.0 (#3294)
Relates to:
- https://github.com/linkerd/website/pull/470
- https://github.com/linkerd/website/pull/475

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-08-20 14:19:45 -07:00
Andrew Seigner d4cd8add3a
Add changes for `edge-19.8.5` (#3285)
Depends on #3286

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-08-19 14:15:25 -07:00
Andrew Seigner f9c956b91e
Add changes for `edge-19.8.4` (#3272)
Depends on #3276

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-08-16 14:03:45 -07:00
Andrew Seigner a213343978
Add changes for `edge-19.8.3` (#3265)
Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-08-15 10:38:14 -07:00
Carol A. Scott 0267f01641
Add changes for `edge-19.8.2` (#3216)
Adding change notes for `edge-19.8.2`
2019-08-08 15:47:20 -07:00
Kevin Leimkuhler 783c0bb59b
Add changes for `edge-19.8.1` (#3184)
**Significant Update**

This edge release introduces a new tap APIService. The Kubernetes apiserver
authenticates the requesting tap user and then forwards tap requests to the new
tap APIServer. The `linkerd tap` command now makes requests against the
APIService.

With this release, users must be authorized via RBAC to use the `linkerd tap`
command. Specifically `linkerd tap` requires the `watch` verb on all resources
in the `tap.linkerd.io/v1alpha1` APIGroup. More granular access is also
available via sub-resources such as `deployments/tap` and `pods/tap`.

* CLI
  * Added a check to the `linkerd check` command to validate the user has
    privileges necessary to create CronJobs
  * Introduced the `linkerd --as` flag which allows users to impersonate another
    user for Kubernetes operations
  * The `linkerd tap` command now makes requests against the tap APIService
* Controller
  * Added HTTP security headers on all dashboard responses
  * Fixed nil pointer dereference in the destination service when an endpoint
    does not have a `TargetRef`
  * Added resource limits when HA is enabled
  * Added RSA support to TLS libraries
  * Updated the destination service to return `InvalidArgument` for external
    name services so that the proxy does not immediately fail the request
  * The `l5d-require-id` header is now set on tap requests so that a connection
    is established over TLS
  * Introduced the `APIService/v1alpha1.tap.linkerd.io` global resource
  * Introduced the `ClusterRoleBinding/linkerd-linkerd-tap-auth-delegator`
    global resource
  * Introduced the `Secret/linkerd-tap-tls` resource into the `linkerd`
    namespace
  * Introduced the `RoleBinding/linkerd-linkerd-tap-auth-reader` resource into
    the `kube-system` namespace
* Proxy
  * Added the `LINKERD2_PROXY_TAP_SVC_NAME` environment variable so that the tap
    server attempts to authorize client identities
* Internal
  * Replaced `dep` with Go modules for dependency management

Signed-off-by: Kevin Leimkuhler <kleimkuhler@icloud.com>
2019-08-01 17:06:38 -07:00
Ivan Sim e94ae225d0
Change log for edge-19.7.5 (#3140)
Signed-off-by: Ivan Sim <ivan@buoyant.io>
2019-07-25 10:05:17 -07:00
Alejandro Pedraza 58d0eaa93b
Release notes for Edge-19.7.4 (#3101)
Signed-off-by: Alejandro Pedraza <alejandro@buoyant.io>
2019-07-18 12:24:47 -05:00
Kevin Leimkuhler a63c9cedc9
Add release notes for stable-2.4.0 (#3032)
## stable-2.4.0

This release adds traffic splitting functionality, support for the Kubernetes
Service Mesh Interface (SMI), graduates high-availability support out of
experimental status, and adds a tremendous list of other improvements,
performance enhancements, and bug fixes.

Linkerd's new traffic splitting feature allows users to dynamically control the
percentage of traffic destined for a service. This powerful feature can be used
to implement rollout strategies like canary releases and blue-green deploys.
Support for the [Service Mesh Interface](https://smi-spec.io) (SMI) makes it
easier for ecosystem tools to work across all service mesh implementations.

Along with the introduction of optional install stages via the `linkerd install
config` and `linkerd install control-plane` commands, the default behavior of
the `linkerd inject` command only adds annotations and defers injection to the
always-installed proxy injector component.

Finally, there have been many performance and usability improvements to the
proxy and UI, as well as production-ready features including: 
* A new `linkerd edges` command that provides fine-grained observability into
  the TLS-based identity system
* A `--enable-debug-sidecar` flag for the `linkerd inject` command that improves
  debugging efforts

Linkerd recently passed a CNCF-sponsored security audit! Check out the in-depth
report [here](https://github.com/linkerd/linkerd2/blob/master/SECURITY_AUDIT.pdf).

To install this release, run: `curl https://run.linkerd.io/install | sh`

**Upgrade notes**: Use the `linkerd upgrade` command to upgrade the control
plane. This command ensures that all existing control plane's configuration and
mTLS secrets are retained. For more details, please see the [upgrade
instructions](https://linkerd.io/2/tasks/upgrade/#upgrade-notice-stable-2-4-0) for more details.

**Special thanks to**: @alenkacz, @codeman9, @dwj300, @jackprice, @liquidslr
@matej-g, @Pothulapati, @zaharidichev, 

**Full release notes**:

* CLI
  * **Breaking Change** Removed the `--proxy-auto-inject` flag, as the proxy
    injector is now always installed
  * **Breaking Change** Replaced the `--linkerd-version` flag with the
    `--proxy-version` flag in the `linkerd install` and `linkerd upgrade`
    commands, which allows setting the version for the injected proxy sidecar
    image, without changing the image versions for the control plane
  * Introduced install stages: `linkerd install config` and `linkerd install
    control-plane`
  * Introduced upgrade stages: `linkerd upgrade config` and `linkerd upgrade
    control-plane`
  * Introduced a new `--from-manifests` flag to `linkerd upgrade` allowing
    manually feeding a previously saved output of `linkerd install` into the
    command, instead of requiring a connection to the cluster to fetch the
    config
  * Introduced a new `--manual` flag to `linkerd inject` to output the proxy
    sidecar container spec
  * Introduced a new `--enable-debug-sidecar` flag to `linkerd inject`, that
    injects a debug sidecar to inspect traffic to and from the meshed pod
  * Added a new check for unschedulable pods and PSP issues (thanks,
    @liquidslr!)
  * Disabled the spinner in `linkerd check` when running without a TTY
  * Ensured the ServiceAccount for the proxy injector is created before its
    Deployment to avoid warnings when installing the proxy injector (thanks,
    @dwj300!)
  * Added a `linkerd check config` command for verifying that `linkerd install
    config` was successful
  * Improved the help documentation of `linkerd install` to clarify flag usage
  * Added support for private Kubernetes clusters by changing the CLI to connect
    to the control plane using a port-forward (thanks, @jackprice!)
  * Fixed `linkerd check` and `linkerd dashboard` failing when any control plane
    pod is not ready, even when multiple replicas exist (as in HA mode)
  * **New** Added a `linkerd edges` command that shows the source and
    destination name and identity for proxied connections, to assist in
    debugging
  * Tap can now be disabled for specific pods during injection by using the
    `--disable-tap` flag, or by using the `config.linkerd.io/disable-tap`
    annotation
  * Introduced pre-install healthcheck for clock skew (thanks, @matej-g!)
  * Added a JSON option to the `linkerd edges` command so that output is
    scripting friendly and can be parsed easily (thanks @alenkacz!)
  * Fixed an issue when Linkerd is installed with `--ha`, running `linkerd
    upgrade` without `--ha` will disable the high availability control plane
  * Fixed an issue with `linkerd upgrade` where running without `--ha` would
    unintentionally disable high availability features if they were previously
    enabled
  * Added a `--init-image-version` flag to `linkerd inject` to override the
    injected proxy-init container version
  * Added the `--linkerd-cni-enabled` flag to the `install` subcommands so that
    `NET_ADMIN` capability is omitted from the CNI-enabled control plane's PSP
  * Updated `linkerd check` to validate the caller can create
    `PodSecurityPolicy` resources
  * Added a check to `linkerd install` to prevent installing multiple control
    planes into different namespaces avoid conflicts between global resources
  * Added support for passing a URL directly to `linkerd inject` (thanks
    @Pothulapati!)
  * Added more descriptive output to the `linkerd check` output for control
    plane ReplicaSet readiness
  * Refactored the `linkerd endpoints` to use the same interface as used by the
    proxy for service discovery information
  * Fixed a bug where `linkerd inject` would fail when given a path to a file
    outside the current directory
  * Graduated high-availability support out of experimental status
  * Modified the error message for `linkerd install` to provide instructions for
    proceeding when an existing installation is found
* Controller
  * Added Go pprof HTTP endpoints to all control plane components' admin servers
    to better assist debugging efforts
  * Fixed bug in the proxy injector, where sporadically the pod workload owner
    wasn't properly determined, which would result in erroneous stats
  * Added support for a new `config.linkerd.io/disable-identity` annotation to
    opt out of identity for a specific pod
  * Fixed pod creation failure when a `ResourceQuota` exists by adding a default
    resource spec for the proxy-init init container
  * Fixed control plane components failing on startup when the Kubernetes API
    returns an `ErrGroupDiscoveryFailed`
  * Added Controller Component Labels to the webhook config resources (thanks,
    @Pothulapati!)
  * Moved the tap service into its own pod
  * **New** Control plane installations now generate a self-signed certificate
    and private key pair for each webhook, to prepare for future work to make
    the proxy injector and service profile validator HA
  * Added the ` config.linkerd.io/enable-debug-sidecar` annotation allowing the
    `--enable-debug-sidecar` flag to work when auto-injecting Linkerd proxies
  * Added multiple replicas for the `proxy-injector` and `sp-validator`
    controllers when run in high availability mode (thanks to @Pothulapati!)
  * Defined least privilege default security context values for the proxy
    container so that auto-injection does not fail (thanks @codeman9!)
  * Default the webhook failure policy to `Fail` in order to account for
    unexpected errors during auto-inject; this ensures uninjected applications
    are not deployed
  * Introduced control plane's PSP and RBAC resources into Helm templates; these
    policies are only in effect if the PSP admission controller is enabled
  * Removed `UPDATE` operation from proxy-injector webhook because pod mutations
    are disallowed during update operations
  * Default the mutating and validating webhook configurations `sideEffects`
    property to `None` to indicate that the webhooks have no side effects on
    other resources (thanks @Pothulapati!)
  * Added support for the SMI TrafficSplit API which allows users to define
    traffic splits in TrafficSplit custom resources
  * Added the `linkerd.io/control-plane-ns` label to all Linkerd resources
    allowing them to be identified using a label selector
  * Added Prometheus metrics for the Kubernetes watchers in the destination
    service for better visibility
* Proxy
  * Replaced the fixed reconnect backoff with an exponential one (thanks,
    @zaharidichev!)
  * Fixed an issue where load balancers can become stuck
  * Added a dispatch timeout that limits the amount of time a request can be
    buffered in the proxy
  * Removed the limit on the number of concurrently active service discovery
    queries to the destination service
  * Fix an epoll notification issue that could cause excessive CPU usage
  * Added the ability to disable tap by setting an env var (thanks,
    @zaharidichev!)
  * Changed the proxy's routing behavior so that, when the control plane does
    not resolve a destination, the proxy forwards the request with minimal
    additional routing logic
  * Fixed a bug in the proxy's HPACK codec that could cause requests with very
    large header values to hang indefinitely
  * Fixed a memory leak that can occur if an HTTP/2 request with a payload ends
    before the entire payload is sent to the destination
  * The `l5d-override-dst` header is now used for inbound service profile
    discovery
  * Added errors totals to `response_total` metrics
  * Changed the load balancer to require that Kubernetes services are resolved
    via the control plane
  * Added the `NET_RAW` capability to the proxy-init container to be compatible
    with `PodSecurityPolicy`s that use `drop: all`
  * Fixed the proxy rejecting HTTP2 requests that don't have an `:authority`
  * Improved idle service eviction to reduce resource consumption for clients
    that send requests to many services
  * Fixed proxied HTTP/2 connections returning 502 errors when the upstream
    connection is reset, rather than propagating the reset to the client
  * Changed the proxy to treat unexpected HTTP/2 frames as stream errors rather
    than connection errors
  * Fixed a bug where DNS queries could persist longer than necessary
  * Improved router eviction to remove idle services in a more timely manner
  * Fixed a bug where the proxy would fail to process requests with obscure
    characters in the URI
* Web UI
  * Added the Font Awesome stylesheet locally; this allows both Font Awesome and
    Material-UI sidebar icons to display consistently with no/limited internet
    access (thanks again, @liquidslr!)
  * Removed the Authorities table and sidebar link from the dashboard to prepare
    for a new, improved dashboard view communicating authority data
  * Fixed dashboard behavior that caused incorrect table sorting
  * Removed the "Debug" page from the Linkerd dashboard while the functionality
    of that page is being redesigned
  * Added an Edges table to the resource detail view that shows the source,
    destination name, and identity for proxied connections
  * Improved UI for Edges table in dashboard by changing column names, adding a
    "Secured" icon and showing an empty Edges table in the case of no returned
    edges
* Internal
  * Known container errors were hidden in the integration tests; now they are
    reported in the output without having the tests fail
  * Fixed integration tests by adding known proxy-injector log warning to tests
  * Modified the integration test for `linkerd upgrade` in order to test
    upgrading from the latest stable release instead of the latest edge and
    reflect the typical use case
  * Moved the proxy-init container to a separate `linkerd/proxy-init` Git
    repository

Signed-off-by: Kevin Leimkuhler <kleimkuhler@icloud.com>
2019-07-09 16:29:04 -07:00
Kevin Leimkuhler c5b0659a51
Add edge-19.7.3 release notes (#3051)
## edge-19.7.3

* CLI
  * Graduated high-availability support out of experimental status
  * Modified the error message for `linkerd install` to provide instructions for
    proceeding when an existing installation is found
* Controller
  * Added Prometheus metrics for the Kubernetes watchers in the destination
    service for better visibility

Signed-off-by: Kevin Leimkuhler <kleimkuhler@icloud.com>
2019-07-09 13:10:43 -07:00
Alex Leong 9409e0669a
edge-19.7.2 (#3043)
* CLI
  * Refactored the `linkerd endpoints` to use the same interface as used by the
    proxy for service discovery information
  * Fixed a bug where `linkerd inject` would fail when given a path to a file
    outside the current directory
* Proxy
  * Fixed a bug where DNS queries could persist longer than necessary
  * Improved router eviction to remove idle services in a more timely manner
  * Fixed a bug where the proxy would fail to process requests with obscure
    characters in the URI

Signed-off-by: Alex Leong <alex@buoyant.io>
2019-07-05 17:33:00 -07:00
Eliza Weisman 944f58fb72
release notes for edge-19.7.1 (#3031)
* CLI
  * Added more descriptive output to the `linkerd check` output for control
    plane ReplicaSet readiness
  * **Breaking change** Renamed `config.linkerd.io/debug` annotation to
    `config.linkerd.io/enable-debug-sidecar`, to match the
    `--enable-debug-sidecar` CLI flag that sets it
  * Fixed a bug in `linkerd edges` that caused incorrect identities to be
    displayed when requests were sent from two or more namespaces
* Controller
  * Added the `linkerd.io/control-plane-ns` label to the SMI Traffic Split CRD
* Proxy
  * Fixed proxied HTTP/2 connections returning 502 errors when the upstream
    connection is reset, rather than propagating the reset to the client
  * Changed the proxy to treat unexpected HTTP/2 frames as stream errors rather
    than connection errors

Signed-off-by: Eliza Weisman <eliza@buoyant.io>
2019-07-02 17:25:31 -07:00
Alex Leong 8dec40133a
edge-19.6.4 (#3013)
## edge-19.6.4

This release adds support for the SMI [Traffic Split](https://github.com/deislabs/smi-spec/blob/master/traffic-split.md)
API. Creating a TrafficSplit resource will cause Linkerd to split traffic
between the specified backend services. Please see [the spec](https://github.com/deislabs/smi-spec/blob/master/traffic-split.md)
for more details.

* CLI
  * Added a check to `install` to prevent installing multiple control planes
    into different namespaces
  * Added support for passing a URL directly to `linkerd inject` (thanks
    @Pothulapati!)
  * Added the `--all-namespaces` flag to `linkerd edges`
* Controller
  * Added support for the SMI TrafficSplit API which allows users to define
    traffic splits in TrafficSplit custom resources
* Web UI
  * Improved UI for Edges table in dashboard by changing column names, adding a
    "Secured" icon and showing an empty Edges table in the case of no returned
    edges

Signed-off-by: Alex Leong <alex@buoyant.io>
2019-06-28 16:30:59 -07:00
Kevin Leimkuhler e1f663ecc2
Add release notes for edge-19.6.3 (#2985)
## edge-19.6.3

* CLI
  * Updated `linkerd check` to validate the caller can create
    `PodSecurityPolicy` resources
* Controller
  * Default the mutating and validating webhook configurations `sideEffects` 
    property to `None` to indicate that the webhooks have no side effects on
    other resources (thanks @Pothulapati!)
* Proxy
  * Added the `NET_RAW` capability to the proxy-init container to be compatible
    with `PodSecurityPolicy`s that use `drop: all`
  * Fixed the proxy rejecting HTTP2 requests that don't have an `:authority`
  * Improved idle service eviction to reduce resource consumption for clients
    that send requests to many services
* Web UI
  * Removed the "Debug" page from the Linkerd dashboard while the functionality
    of that page is being redesigned
  * Added an Edges table to the resource detail view that shows the source,
    destination name, and identity for proxied connections

Signed-off-by: Kevin Leimkuhler <kleimkuhler@icloud.com>
2019-06-21 14:52:10 -07:00
Dennis Adjei-Baah 694ba9c2cb
Revert add namespace name to MWC (#2946)
* revert add namespace name to MWC
2019-06-14 15:26:34 -07:00
Kevin Leimkuhler 679ca0a24f
Add edge-19.6.2 release notes (#2941)
## edge-19.6.2

* CLI
  * Added the `--linkerd-cni-enabled` flag to the `install` subcommands so that
    `NET_ADMIN` capability is omitted from the CNI-enabled control plane's PSP
* Controller
  * Default to least-privilege security context values for the proxy container
    so that auto-inject does not fail on restricted PSPs (thanks @codeman9!)
  * Defined least privilege default security context values for the proxy
    container so that auto-injection does not fail on (thanks @codeman9!)
  * Default the webhook failure policy to `Fail` in order to account for
    unexpected errors during auto-inject; this ensures uninjected applications
    are not deployed
  * Introduced control plane's PSP and RBAC resources into Helm templates;
    these policies are only in effect if the PSP admission controller is
    enabled
  * Fixed MWC namespace value so that when installing multiple control planes,
    there is a unique configuration for each one
  * Removed `UPDATE` operation from proxy-injector webhook because pod
    mutations are disallowed during update operations
* Proxy
  * The `l5d-override-dst` header is now used for inbound service profile
    discovery
  * Include errors in `response_total` metrics
  * Changed the load balancer to require that Kubernetes services are resolved
    via the control plane
* Web UI
  * Fixed dashboard behavior that caused incorrect table sorting

Signed-off-by: Kevin Leimkuhler <kleimkuhler@icloud.com>
2019-06-13 17:04:28 -07:00
Eliza Weisman 0c896a0a5a
Edge 19.6.1 release notes
## edge-19.6.1

* CLI
  * Fixed an issue where, when Linkerd is installed with `--ha`, running
    `linkerd upgrade` without `--ha` will disable the high availability
    control plane
  * Added a `--init-image-version` flag to `linkerd inject` to override the
    injected proxy-init container version
* Controller
  * Added multiple replicas for the `proxy-injector` and `sp-validator`
    controllers when run in high availability mode (thanks to @Pothulapati!)
* Proxy
  * Fixed a memory leak that can occur if an HTTP/2 request with a payload
    ends before the entire payload is sent to the destination
* Internal
  * Moved the proxy-init container to a separate `linkerd/proxy-init` Git
    repository
2019-06-06 16:16:38 -07:00
Eliza Weisman 41cfed6b80
Stable 2.3.2 release notes (#2904)
## stable-2.3.2

This stable release fixes a memory leak in the proxy.

To install this release, run: `curl https://run.linkerd.io/install | sh`

**Full release notes**:

* Proxy
  * Fixed a memory leak that can occur if an HTTP/2 request with a payload
    ends before the entire payload is sent to the destination

Signed-off-by: Eliza Weisman <eliza@buoyant.io>
2019-06-06 13:35:41 -07:00
Carol A. Scott 68933d7375
Edge 19.5.4 Release Notes (#2872)
## edge-19.5.4

* CLI
  * Added a JSON option to the `linkerd edges` command so that output is
    scripting friendly and can be parsed easily (thanks @alenkacz!)
* Controller
  * **New** Control plane installations now generate a self-signed certificate
    and private key pair for each webhook, to prepare for future work to make
    the proxy injector and service profile validator HA
  * Added a debug container annotation, allowing the `--enable-debug-sidecar`
    flag to work when auto-injecting Linkerd proxies
* Proxy
  * Changed the proxy's routing behavior so that, when the control plane does
    not resolve a destination, the proxy forwards the request with minimal
    additional routing logic
  * Fixed a bug in the proxy's HPACK codec that could cause requests with very
    large header values to hang indefinitely
* Web UI
  * Removed the Authorities table and sidebar link from the dashboard to prepare
    for a new, improved dashboard view communicating authority data
* Internal
  * Modified the integration test for `linkerd upgrade` to test upgrading from
    the latest stable release instead of the latest edge, to reflect the typical
    use case
2019-05-31 12:56:23 -07:00
Dennis Adjei-Baah c549b64327
Stable 2.3.1 Release Notes (#2869)
This stable release adds a number of proxy stability improvements.

To install this release, run: `curl https://run.linkerd.io/install | sh`

**Special thanks to**: @zaharidichev and @11Takanori!

**Full release notes**:

* Proxy
  * Changed the proxy's routing behavior so that, when the control plane
    does not resolve a destination, the proxy forwards the request with minimal
    additional routing logic
  * Fixed a bug in the proxy's HPACK codec that could cause requests with
    very large header values to hang indefinitely
  * Replaced the fixed reconnect backoff with an exponential one (thanks,
    @zaharidichev!)
  * Fixed an issue where requests could be held indefinitely by the load balancer
  * Added a dispatch timeout that limits the amount of time a request can be
    buffered in the proxy
  * Removed the limit on the number of concurrently active service discovery
    queries to the destination service
  * Fixed an epoll notification issue that could cause excessive CPU usage
  * Added the ability to disable tap by setting an env var (thanks,
    @zaharidichev!)
2019-05-31 08:59:17 -07:00
Risha Mars 23c7a79ba5
Update CHANGES.md for edge-19.5.3 release (#2829)
* Update CHANGES.md for edge-19.5.3 release
2019-05-16 12:41:26 -07:00
Eliza Weisman 9aa7310f0f
Release notes for edge-19.5.2 (#2816)
* CLI
  * Fixed `linkerd check` and `linkerd dashboard` failing when any control plane
    pod is not ready, even when multiple replicas exist (as in HA mode)
* Controller
  * Fixed control plane components failing on startup when the Kubernetes API
    returns an `ErrGroupDiscoveryFailed`
* Proxy
  * Added a dispatch timeout that limits the amount of time a request can be
    buffered in the proxy
  * Removed the limit on the number of concurrently active service discovery
    queries to the Destination service

Special thanks to @zaharidichev for adding end to end tests for proxies with
TLS!

Signed-off-by: Eliza Weisman <eliza@buoyant.io>
2019-05-10 13:42:48 -07:00
Alex Leong 7829fcc28d
Release notes for Edge-19.5.1 (#2784)
* CLI
  * Added a `linkerd check config` command for verifying that
    `linkerd install config` was successful
  * Improved the help documentation of `linkerd install` to clarify flag usage
  * Added support for private Kubernetes clusters by changing the CLI to connect
    to the control plane using a port-forward (thanks, @jackprice!)
* Controller
  * Fixed pod creation failure when a `ResourceQuota` exists by adding a default
    resource spec for the proxy-init init container
* Proxy
  * Replaced the fixed reconnect backoff with an exponential one (thanks,
    @zaharidichev!)
  * Fixed an issue where load balancers can become stuck
* Internal
  * Fixed integration tests by adding known proxy-injector log warning to tests

Signed-off-by: Alex Leong <alex@buoyant.io>
2019-05-02 14:23:16 -07:00
Alejandro Pedraza 0a19e063f4
Release notes for Edge-19.4.5 (#2755)
Signed-off-by: Alejandro Pedraza <alejandro@buoyant.io>
2019-04-26 10:13:06 -05:00
Andrew Seigner e6a29728c8
Release notes for stable-2.3.0 (#2701)
Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-04-16 14:18:07 -07:00
Dennis Adjei-Baah b61af6c8c9
Release notes for edge-19.4.4 (#2690)
* release notes for edge-19.4.4

Signed-off-by: Dennis Adjei-Baah <dennis@buoyant.io>
2019-04-11 14:31:49 -07:00
Andrew Seigner abcb8bb22c
Updated release notes for edge-19.4.3 (#2670)
Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-04-08 17:19:58 -07:00
Kevin Leimkuhler 65a228fe6c
Add edge-19.4.2 release notes (#2648)
* Add edge-19.4.2 release notes

Signed-off-by: Kevin Leimkuhler <kevinl@buoyant.io>
2019-04-05 15:51:59 -07:00
Kevin Leimkuhler 552060ddd8
Add edge-19.4.1 release notes (#2610)
* Add edge-19.4.1 release notes

Signed-off-by: Kevin Leimkuhler <kevinl@buoyant.io>
2019-04-02 09:35:07 -07:00
Carol A. Scott c1c1b3f0a3
Adding edge-19.3.3 updates (#2544)
This PR updates CHANGES.md with information about the newest edge release, 19.3.3.
2019-03-22 13:26:30 -07:00
Kevin Lingerfelt 77e3b70d3e
Update CHANGES.md for the edge-19.3.2 release (#2495)
* Update CHANGES.md for the edge-19.3.2 release
* Fix typo
* Wordsmithing

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2019-03-14 11:00:36 -07:00
Risha Mars a454662c3f
Edit CHANGES.md to remove a branch that isn't merged yet (#2463) 2019-03-06 18:59:38 -05:00
Risha Mars 1bb60e2bc5
Update CHANGES.md for the edge-19.3.1 release (#2458)
* Update CHANGES.md for the edge-19.3.1 release
2019-03-06 17:49:03 -05:00
Ivan Sim d805cb9a2b
Changelog for edge-19.2.5 release (#2412)
Signed-off-by: Ivan Sim <ivan@buoyant.io>
2019-02-27 16:06:33 -08:00
Kevin Lingerfelt 1fc25e1f70
Add release notes for stable-2.2.1 release (#2340)
Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2019-02-20 18:11:28 -08:00
Alejandro Pedraza 249b5aed62
Update CHANGES.md for the edge-19.2.4 release (#2336)
* Update CHANGES.md for the edge-19.2.4 release

Signed-off-by: Alejandro Pedraza <alejandro.pedraza@gmail.com>
2019-02-20 19:09:44 -05:00
Kevin Lingerfelt 1cde1f083c
Update CHANGES.md for the stable-2.2.0 release (#2263)
Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2019-02-12 13:14:43 -08:00
Kevin Lingerfelt 121cd59656
Update CHANGES.md for edge-19.2.3 release (#2268)
Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2019-02-12 11:29:03 -08:00
Andrew Seigner db747eec8a
Retroactively update edge-19.2.1 release notes (#2259)
edge-19.2.1 included a breaking change related to the namespace where
`ServiceProfile`s are defined.

This change updates the release notes for that release to indicate the
breaking change.

Relates to linkerd/website#156

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-02-11 16:39:07 -08:00
Kevin Lingerfelt 4a5152e9e3
Update CHANGES.md for edge-19.2.2 release (#2251)
* Update CHANGES.md for edge-19.2.2 release

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2019-02-11 12:58:20 -08:00
Kevin Leimkuhler 19120d332d
Add release notes for edge-19.2.1 (#2230)
Signed-off-by: Kevin Leimkuhler <kevin@kleimkuhler.com>
2019-02-07 16:40:34 -08:00
Alejandro Pedraza aced50f3cd
Update CHANGES.md for edge-19.1.4 release (#2186)
Update CHANGES.md for edge-19.1.4 release

Signed-off-by: Alejandro Pedraza <alejandro@buoyant.io>
2019-01-31 17:59:40 -05:00
Risha Mars 65f4fd4f2a
Edit changes.md to match the release notes (#2150)
* Edit changes.md to match the release notes on https://github.com/linkerd/linkerd2/releases

Co-Authored-By: rmars <mars@buoyant.io>
2019-01-25 10:49:39 -08:00
Risha Mars c5ac7401e4
Update CHANGES.md for edge-19.1.3 release (#2148)
* Update CHANGES.md for edge-19.1.3 release
2019-01-24 16:02:52 -08:00
Andrew Seigner 50d181cfb8
Add release notes for edge-19.1.2 release (#2096)
Depends on #2037, #2038, #2063, #2066, #2087, #2089, #2105

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-01-17 14:10:59 -08:00
Kevin Lingerfelt 21d9397380
Update CHANGES.md for the edge-19.1.1 release (#2065)
* Update CHANGES.md for the edge-19.1.1 release
* Tweak wording / punctuation
* Update wording for proxy fixes

Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2019-01-10 15:55:12 -08:00
Kevin Lingerfelt 42fa9e90a1
Add release notes for edge-18.12.4 release (#2019)
Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2018-12-20 15:46:38 -08:00
Risha Mars a1c5e523ca
Update CHANGES.md for the edge-18.12.3 release (#1988)
* Update CHANGES.md for the edge-18.12.3 release
2018-12-14 13:49:43 -08:00
Kevin Lingerfelt 3ff971fd59
Add release notes for stable-2.1.0 release (#1957)
Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2018-12-06 14:04:14 -08:00
Kevin Lingerfelt 5418324e99
Add release notes for edge-18.12.2 release (#1955)
Signed-off-by: Kevin Lingerfelt <kl@buoyant.io>
2018-12-06 13:08:35 -08:00