This page applies to Apigee and Apigee hybrid.
View Apigee Edge documentation.
This page documents release notes for all Apigee Adapter for Envoy software for 2021 and prior.
See Adapter for Envoy for current release notes (2022 and later).
v2.0.4
On December 3, 2021, we released version 2.0.4 of Apigee Adapter for Envoy.
Features and improvements
- The list of supported Envoy and Istio versions for the CLI
samples
command has been updated. These versions are now supported for samples:- Envoy versions 1.18 to 1.20
- Istio versions 1.10 to 1.12
Issues fixed
- A nil-check was added for the PEM block private key loading to avoid panic. (Issue #360)
- Remote service authorization errors are now logged at the Debug level. An exception to this categorization
is made for token fetching errors for API keys. In that case, errors are logged at the Error
level so that they are visible even if Debug log level for
apigee-remote-service-envoy
is disabled. See also Setting remote service log levels. (Issue #104)
v2.0.3
On September 21, 2021, we released version 2.0.3 of Apigee Adapter for Envoy.
Issues fixed
- An analytics logging issue with direct responses was fixed. The issue only occurred under certain
circumstances. For example:
- For requests not requiring authn/z check, no
authContext
was generated and dynamic metadata was nil causing the access log entry to be ignored. - The denied response used RPC code instead of HTTP code, causing records to be shown in the Apigee UI as success.
- For requests not requiring authn/z check, no
v2.0.2
On June 7, 2021, we released version 2.0.2 of Apigee Adapter for Envoy.
Issues fixed
- A race condition was fixed that could cause 403 errors and panics when JWT claims scopes were nil.
v2.0.1
On Tuesday, April 29, 2021, we released version 2.0.1 of Apigee Adapter for Envoy.
Issues fixed
Feature | Description |
---|---|
Bug |
An issue was fixed that caused v2.0.0 to malfunction when used with Apigee hybrid v1.5.0 or Apigee. If you are upgrading your Apigee hybrid installation to v1.5.x, the recommended upgrade path for the adapter is:
If you are using Apigee, then just upgrade the adapter to v2.0.1. |
v2.0.0
On Tuesday, April 6, 2021, we released version 2.0.0 of Apigee Adapter for Envoy.
Features and improvements
Feature | Description |
---|---|
Multi-tenant environment support |
You can now enable the adapter to service multiple environments in an Apigee organization. This feature allows you to use one Apigee Adapter for Envoy associated with one Apigee organization to service multiple environments. Before this change, one adapter was always tied to one Apigee environment. For more information about this feature, see Multi-tenant environment support. |
Envoy v3 API support | |
Envoy metadata support |
Envoy 1.16+ allows
sending This feature is only supported for Envoy 1.16+ and Istio 1.9+.
With this change, the following configuration is no longer added to the Envoy
configuration file ( additional_request_headers_to_log: - x-apigee-accesstoken - x-apigee-api - x-apigee-apiproducts - x-apigee-application - x-apigee-clientid - x-apigee-developeremail - x-apigee-environment If you want to append headers to requests for a special case, just set the property
|
Split the remote-token proxy from the remote-service proxy |
The remote-service proxy has been refactored into two separate proxies. The v2.0.x, provisioning
will install two API proxies: remote-service and remote-token. The
This change creates a useful separation of functions. Now, the remote-service
proxy is only used for internal Adapter communications, while the remote-token
proxy provides a sample OAuth workflow that you can customize. We will never
overwrite your custom remote-token proxy, even if the |
Data capture support | The Adapter now supports passing Envoy metadata to Apigee's data capture feature, which sends data captured in variables that you specify to Apigee analytics for use in custom reports. This feature provides a capability that is similar to the Apigee Data Capture policy. For more information about this feature, see Capturing data for custom reports. |
RBAC not required | As noted previously under Envoy metadata support, we now immediately reject unauthorized requests without requiring a separate RBAC filter. Because RBAC is not used, clients will now receive these HTTP status codes as appropriate from the Adapter:
If you want to allow unauthorized requests to continue, you can do so by setting
|
x-apigee-* headers are no longer appended by default |
As noted previously in the Envoy metadata support section,
|
Custom matching a request to an Apigee API Product Operation |
The semantics of the
To override this header value using Envoy metadata, you can pass the typed_per_filter_config: envoy.filters.http.ext_authz: "@type": type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthzPerRoute check_settings: context_extensions: apigee_api: httpbin.org |
Analytics for rejected requests are logged immediately | Envoy Adapter will now log rejected requests immediately to analytics as required instead of waiting for the request to return in the access log. This is more efficient and doesn't require any metadata be attached to the request. |
UDCA support has been removed | Streaming to Apigee's Universal Data Collection Agent (UDCA) in Apigee hybrid and Apigee is no longer needed for analytics as it has been replaced by direct upload. This change simply removes the legacy support for this option. |
mTLS support added for Edge for Private Cloud in the provision/bindings CLI commands |
Apigee Edge for Private Cloud users can supply client-side TLS certificates and root cert via |
mTLS support between the adapter and Apigee runtime |
You can supply client-side TLS certificates in the |
Other issues and fixes
- An issue was fixed where multiple operation configs with the same API source shared the same quota bucket identifiers and caused conflicts in quota calculation. (Issue #34)
- An issue was fixed where operations with no specified verbs caused the request to be denied (the expected behavior is to allow all verbs if none are specified). (Issue #39)
v1.4.0
On Wednesday, December 16, 2020, we released the version 1.4.0 of Apigee Adapter for Envoy.
Supported platforms
We publish binaries for MacOS, Linux, and Windows.
We publish docker images from Google's distroless, Ubuntu, and Ubuntu with Boring Crypto.
In this version we support the following platforms:
- Apigee hybrid version 1.3.x, 1.4.x (release date pending), Apigee for Public Cloud, Apigee for Private Cloud, and Apigee on Google Cloud
- Istio versions 1.5, 1.6, 1.7, 1.8
- Envoy versions 1.14, 1.15, 1.16
Features and improvements
Feature | Description |
---|---|
The remote-service proxy no longer requires association with
an API product that uses Remote Service Targets. |
Because this association is no longer required, note the following changes:
|
The Apigee Organization Admin role is no longer required for provisioning. |
Rather than require the org admin permission for provisioning, you can now use
the IAM roles API Creator and Deployer instead. You must grant both of these roles
to successfully provision.
|
Other issues and fixes
- An issue was fixed where re-provisioning Apigee without the
--rotate
option exited with an error. - The provisioning CLI now reads and reuses the analytics service account credentials
from a given
config.yaml
file (Issue #133).
v1.3.0
On Monday, November 23, 2020, we released the version 1.3.0 of Apigee Adapter for Envoy.
Supported platforms
We publish binaries for MacOS, Linux, and Windows.
We publish docker images from Google's distroless, Ubuntu, and Ubuntu with Boring Crypto.
In this version we support the following platforms:
- Apigee hybrid version 1.3.x, 1.4.x (release date pending), Apigee for Public Cloud, Apigee for Private Cloud, and Apigee on Google Cloud
- Istio versions 1.5, 1.6, 1.7, 1.8
- Envoy versions 1.14, 1.15, 1.16
Features and improvements
Feature | Description |
---|---|
Support for API product OperationGroups. | OperationGroups bind the resources and associated quota enforcement in a proxy or
remote service with HTTP methods. For details, see
OperationGroup.
(Applies to Apigee on Google Cloud and Apigee hybrid only) |
Remove support for dynamic forward proxy from samples generation. | Because of this change, clients must include the HOST header if the hostname is
different than the remote service target host that is set in the API product. For
example:
curl -i http://localhost:8080/httpbin/headers -H "HOST:httpbin.org" |
Support service accounts and Workload Identity. | To allow analytics data to be uploaded to Apigee when
running the adapter outside an Apigee hybrid cluster, you must use the
analytics-sa parameter with the apigee-remote-service-cli provision
command. In addition, the adapter now supports Workload Identity on Google Kubernetes
Engine (GKE). See Provision command.
(Applies to Apigee on Google Cloud and Apigee hybrid only) |
New jwt_provider_key configuration attribute. |
This key is added to the config file.
It represents the JWT provider's payload_in_metadata key in
Envoy config
or the RequestAuthentication JWT issuer in Istio config. |
KeepAliveMaxConnectionAge configuration attribute now
defaults to 1 minute. |
The previous default was 10 minutes. This change allows smoother scaling. This value is also used for the access log stream lifetime. See config file. |
Removed CLI commands. | The following CLI commands have been deprecated. We recommend that you use the
Apigee APIs
instead to update remote service targets for API products:
|
Added new CLI command. | The command:
apigee-remote-service-cli samples templates lists the available options
that you can use with the |
Changed existing CLI command. | A change was made to the apigee-remote-service-cli samples create
command. Flags specific to Envoy or Istio templates are strictly checked, and
errors are returned on wrongly used flags. The native template option is
deprecated. To get a list of available templates, use the apigee-remote-service-cli samples templates command.
See also CLI reference.
|
The /token endpoint response now follows the
OAuth2 spec. |
The access_token parameter was added to the response, and the token parameter
is deprecated. |
v1.2.0
On Wednesday, September 30, 2020, we released the version 1.2.0 of Apigee Adapter for Envoy.
Supported platforms
We publish binaries for MacOS, Linux, and Windows.
We publish docker images from Google's distroless, Ubuntu, and Ubuntu with Boring Crypto.
In this version we support the following platforms:
- Apigee hybrid version 1.3.x
- Istio versions 1.5, 1.6, 1.7
- Envoy versions 1.14, 1.15
Features and improvements
Feature | Description |
---|---|
Support for Apigee on Google Cloud | You can now use Apigee Adapter for Envoy with Apigee on Google Cloud. You can run the adapter in its own cluster or by running the Remote Service for Envoy as a native binary or in a container. Provision the adapter on Apigee using the provision command. |
Direct upload for analytics data | You can now configure the Apigee Adapter to upload analytics data to Apigee directly. If you are
using Apigee hybrid, this
new feature makes it possible to deploy the adapter to its own Kubernetes cluster, outside
of the cluster where Apigee hybrid is installed. To enable direct upload, use the new
--analytics-sa flag with the provision command.
See provision command.
|
Health check returns "Ready" after API product data is loaded from Apigee | The Kubernetes health check will not return "Ready" until the API product data is loaded from Apigee. This change helps with scaling and upgrading, because no traffic will be sent to the newly instantiated adapter until it is ready. |
Other issues and fixes
- An issue was fixed to address a potential quota sync deadlock (Issue #17).
- Prometheus annotations were moved to pod spec (Issue #69).
- An issue was fixed to address improperly emitted verify errors (Issue #62).
v1.1.0
On Wednesday, August 26, 2020, we released the version 1.1.0 of Apigee Adapter for Envoy.
Supported platforms
We publish binaries for MacOS, Linux, and Windows.
We publish docker images from Google's distroless, Ubuntu, and Ubuntu with Boring Crypto.
In version 1.1.0 we support the following platforms:
- Apigee hybrid version 1.3
- Istio versions 1.5, 1.6, 1.7
- Envoy versions 1.14, 1.15
Features and improvements
Feature | Description |
---|---|
Verify bindings | A new command apigee-remote-service-cli bindings verify was
added to the CLI. This command verifies that the specified bound API product and its
associated developer apps also have a remote service product associated with them. See
Verify a binding. |
Generate samples | A new command apigee-remote-service-cli samples create was added
to the CLI. This command creates
sample configuration files for native Envoy or Istio deployments. The config
files you generate with this command replace the sample files that were installed
with the Adapter for Envoy in previous versions. See
Samples command. |
OAuth2 authentication | The adapter now uses OAuth2 authentication when multi-factor auth (MFA) is
enabled for Apigee. Use the --mfa flag whenever you use the
--legacy flag. |
Distroless container | The adapter now uses Google's distroless (gcr.io/distroless/base ) image instead
of scratch for the default Docker image base. |
Other issues and fixes
- A CLI issue was fixed for bindings commands in OPDK. (#29)
- Quota could become stuck when connection lost (apigee/apigee-remote-service-envoy. (#31)
- Docker images are now built with non-root user (999).
- Kubernetes samples enforce the user must not be root.
- The
--http1.1
is no longer needed for curl commands against proxy endpoints. The flag has been removed from examples.
v1.0.0
On Friday, July 31, 2020, we released the GA version of Apigee Adapter for Envoy.
Supported platforms
We publish binaries for MacOS, Linux, and Windows.
We publish docker images from scratch, Ubuntu, and Ubuntu with Boring Crypto.
In version 1.0.0 we support the following platforms:
- Apigee hybrid version 1.3
- Istio versions 1.5, 1.6
- Envoy versions 1.14, 1.15
Additions and changes
Between the v1.0-beta4 release and GA, the following additions changes were made to the adapter:
Go Boring builds
A new build is now available that uses FIPS compliant Go BoringSSL libraries.
- Log level flag changes
The logging level flags for the apigee-remote-service-envoy service have been changed for consistency:
Old flag New flag log_level
log-level
json_log
json-log
- New CLI flags
New flags were added to the CLI
token
commands:Flag Description --legacy
Set this flag if you are using Apigee Cloud. --opdk
Set this flag if you are using Apigee for Private Cloud.