Skip to content

Commit d1b87c0

Browse files
authored
[release/v1.6] v1.6.0 release docs (#7475)
Signed-off-by: Rudrakh Panigrahi <[email protected]>
1 parent c51e3b0 commit d1b87c0

File tree

4 files changed

+79
-7
lines changed

4 files changed

+79
-7
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
v1.6.0-rc.1
1+
v1.6.0

release-notes/current.yaml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,8 @@ security updates: |
88
99
# New features or capabilities added in this release.
1010
new features: |
11-
Added support for both Global and Local rate limiting in BackendTrafficPolicy simultaneously.
12-
Added support for applying SecurityPolicy Authorization to TCPRoute (client IP / allow-deny list for TCP traffic).
1311
1412
bug fixes: |
15-
- Fixed Listener port limit typo 65353 -> 65535.
16-
- Fixed issue where reloading invalid envoy gateway configuration.
17-
- Fixed missing JWT provider configuration when JWT authentication is configured on multiple HTTP listeners sharing the same port.
18-
- Fixed issue where header modifier doesn't permit multiple values with commas.
1913
2014
# Enhancements that improve performance.
2115
performance improvements: |

release-notes/v1.6.0.yaml

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
date: November 10, 2025
2+
3+
# Changes that are expected to cause an incompatibility with previous versions, such as deletions or modifications to existing APIs.
4+
breaking changes: |
5+
ALPNProtocols in EnvoyProxy Backend TLS settings now default to [h2, http/1.1] when not explicitly configured.
6+
When a Backend resource specifies TLS settings and SNI is not specified or a BackendTLSPolicy is not attached to it, the upstream TLS SNI value is now automatically determined from the HTTP Host header.
7+
When a Backend resource specifies TLS settings and SNI is not specified or a BackendTLSPolicy is not attached to it, upstream certificate validation now requires DNS SAN to match the SNI value that is sent.
8+
When a MirrorPolicy is used, the shadow host suffix is no longer automatically appended to the mirrored cluster name.
9+
When running `egctl experimental collect`, SDS (Secret Discovery Service) data is no longer included by default. To include SDS data, enable it by adding the `--sds true` flag.
10+
When setting `consecutiveGatewayFailure`, `enforcingConsecutiveGatewayFailure` is automatically set to 100.
11+
When the OIDC provider issues a refresh token, Envoy Gateway will now automatically use it to refresh access and ID tokens when they expire. To maintain the previous behavior (not using refresh tokens), set `refreshToken` to false in the OIDC authentication configuration. See https://gateway.envoyproxy.io/docs/api/extension_types/#securitypolicyspec for details.
12+
13+
# Updates addressing vulnerabilities, security flaws, or compliance requirements.
14+
security updates: |
15+
16+
# New features or capabilities added in this release.
17+
new features: |
18+
Added support for mutual TLS (mTLS) configuration for ExtensionServer to enable secure communication between Envoy Gateway and extension servers.
19+
Added support for configuring RetryPolicy in gRPC External Authentication callouts via SecurityPolicy backend settings fields, allowing fine-grained control over retry behavior for authentication requests.
20+
Added support for configuring late response headers in ClientTrafficPolicy, enabling headers to be added to responses after the response body has started.
21+
Added support for configuring maximum connection duration, stream duration, and maximum requests per connection in ClientTrafficPolicy to provide better control over connection lifecycle and resource usage.
22+
Added PercentageEnabled configuration option to ZoneAware load balancing configuration, enabling gradual rollout of zone-aware routing.
23+
Added cacheDuration configuration for remoteJWKS (Remote JSON Web Key Set) in SecurityPolicy, allowing customization of JWKS caching behavior for improved performance.
24+
Added support for DisableTokenEncryption in OIDC authentication to disable encryption of ID and access tokens stored in cookies, providing flexibility for environments with alternative security mechanisms.
25+
Added support for OCSP (Online Certificate Status Protocol) stapling in listener TLS certificates, improving TLS handshake performance and enabling real-time certificate revocation checking.
26+
Added support for per-backend client TLS settings in Backend resources, enabling configuration of client certificates, ciphers, TLS versions, and ALPN protocols on a per-backend basis for granular TLS control.
27+
Added support for returning HTTP 503 Service Unavailable responses when no valid backend endpoints exist, improving observability and user experience during service outages.
28+
Added support for CSRFTokenTTL configuration in OIDC authentication to customize the lifetime of CSRF tokens used during the OAuth2 authorization code flow, enhancing security and session management.
29+
Added support for HTTP/2 stream timeout configuration, providing control over stream-level timeouts in HTTP/2 connections.
30+
Added support for Envoy PreconnectPolicy in BackendTrafficPolicy, enabling proactive connection establishment to backend services for reduced latency.
31+
Added support for binaryData in ConfigMap referenced by HTTPRouteFilter for direct response, allowing binary content to be served directly from ConfigMaps.
32+
Added support for PodDisruptionBudget (PDB) configuration for the rate limit service, improving availability during cluster maintenance operations.
33+
Added automatic generation of TLS certificates in host mode when they do not exist, simplifying deployment and reducing manual certificate management overhead.
34+
Added automatic implicit support for OPTIONS HTTP method when HTTPRoute CORS filter is used, simplifying CORS configuration for preflight requests.
35+
Added support for rate limiting based on HTTP path and method in BackendTrafficPolicy, enabling more granular rate limiting policies.
36+
Added support for Certificate Revocation Lists (CRLs) in ClientTrafficPolicy, enabling certificate revocation checking for enhanced security.
37+
Added support for both Global and Local rate limiting in BackendTrafficPolicy simultaneously.
38+
Added support for applying SecurityPolicy Authorization to TCPRoute (client IP / allow-deny list for TCP traffic).
39+
40+
bug fixes: |
41+
Fixed %ROUTE_KIND% operator to be properly lower-cased when used by clusterStatName in EnvoyProxy API, ensuring consistent metric naming conventions.
42+
Fixed maxAcceptPerSocketEvent configuration being ignored in ClientTrafficPolicy, now correctly applying the configured value to limit connections accepted per socket event.
43+
Fixed an issue where topologyInjectorDisabled was enabled but the local cluster was not defined, causing configuration inconsistencies.
44+
Fixed log formatting of improper key-value pairs to prevent DPANIC errors in controller-runtime logger, improving stability and log readability.
45+
Fixed handling of context-related transient errors to prevent incorrect state reconciliation and unintended behavior during API server communication interruptions.
46+
Fixed an issue where the controller could not read EnvoyProxy resources that are attached only to GatewayClass, improving resource discovery and reconciliation.
47+
Fixed adding metadata for proxyService and OIDC xDS clusters, ensuring proper metadata propagation for service discovery and authentication.
48+
Fixed handling of millisecond-level retry durations and token TTLs in OIDC authentication, ensuring precise time-based configuration values are correctly processed.
49+
Fixed indexer and controller crashing when BackendTrafficPolicy has a redirect response override, improving stability during policy configuration updates.
50+
Fixed Lua validator log level to be suppressed by default, reducing log noise and improving performance during Lua script validation.
51+
Fixed ProxyTopologyInjector cache sync race condition that caused injection failures, ensuring reliable topology injection during concurrent operations.
52+
Fixed validation for gRPC routes with extension reference filters, ensuring proper validation and processing of gRPC routes with extension integrations.
53+
Fixed service account token handling in GatewayNamespaceMode to use SDS (Secret Discovery Service) for properly refreshing expired tokens, ensuring continuous service availability.
54+
Fixed handling of regex meta characters in prefix match replace for URL rewrite, ensuring special characters are correctly processed during URL transformations.
55+
Disabled the default emission of `x-envoy-ratelimited` headers from the rate limit filter to reduce header bloat. Re-enable with the `enableEnvoyHeaders` setting in ClientTrafficPolicy if needed.
56+
Fixed a nil pointer panic in the XDS translator when building API key authentication filter configurations with `sanitize` enabled and no `forwardClientIDHeader` set, improving stability and error handling.
57+
Truncated Gateway API status condition messages to stay within Kubernetes limits and prevent update failures, ensuring reliable status updates for large message payloads.
58+
Fixed an issue in EnvoyPatchPolicy where it didn't match the target Gateway or GatewayClass due to an incorrect name reference, ensuring proper policy application.
59+
Fixed certificate SAN (Subject Alternative Name) overlap detection in gateway listeners, improving TLS certificate validation and error reporting.
60+
Fixed description and translation behavior for PreserveXRequestID configuration, ensuring consistent request ID preservation across HTTP requests.
61+
Fixed race condition in proxy context map used in host mode, preventing concurrent access issues and ensuring reliable proxy context management.
62+
Fixed Listener port limit typo 65353 -> 65535.
63+
Fixed issue where reloading invalid envoy gateway configuration.
64+
Fixed missing JWT provider configuration when JWT authentication is configured on multiple HTTP listeners sharing the same port.
65+
Fixed issue where header modifier doesn't permit multiple values with commas.
66+
67+
# Enhancements that improve performance.
68+
performance improvements: |
69+
Set LastTransitionTime in status conditions at subscriber instead of publisher of watcher to prevent applying unnecessary status updates.
70+
Coalesce updates from watcher layer to skip applying intermediate states.
71+
72+
# Deprecated features or APIs.
73+
deprecations: |
74+
75+
# Other notable changes not covered by the above sections.
76+
Other changes: |
77+

site/content/en/news/releases/matrix.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ Envoy Gateway relies on the Envoy Proxy and the Gateway API, and runs within a K
88
| Envoy Gateway version | Envoy Proxy version | Rate Limit version | Gateway API version | Kubernetes version | End of Life |
99
| --------------------- | --------------------------- | ------------------ | ------------------- | -------------------------- | ----------- |
1010
| latest | **dev-latest** | **master** | **v1.3.0** | v1.30, v1.31, v1.32, v1.33 | n/a |
11+
| v1.6 | **distroless-v1.36.2** | **99d85510** | **v1.4.0** | v1.30, v1.31, v1.32, v1.33 | 2026/05/13 |
1112
| v1.5 | **distroless-v1.35.0** | **a90e0e5d** | **v1.3.0** | v1.30, v1.31, v1.32, v1.33 | 2026/02/13 |
1213
| v1.4 | **distroless-v1.34.1** | **3e085e5b** | **v1.3.0** | v1.30, v1.31, v1.32, v1.33 | 2025/11/13 |
1314
| v1.3 | **distroless-v1.33.0** | **60d8e81b** | **v1.2.1** | v1.29, v1.30, v1.31, v1.32 | 2025/07/30 |

0 commit comments

Comments
 (0)