Skip to content

Releases: knative/serving

v1.9.4

06 Jun 16:46
5288c1c
Compare
Choose a tag to compare

Changes since v1.9.3

  • Drop the cluster-autoscaler.kubernetes.io/safe-to-evict: "false" annotation on our deployments (#13984, @dprotaso)

v1.10.2

06 Jun 11:50
500756c
Compare
Choose a tag to compare

Changes since v1.10.1

  • Drop the cluster-autoscaler.kubernetes.io/safe-to-evict: "false" annotation on our deployments (#13984, @dprotaso)
  • Fix activator load balancing (#14052, @dprotaso)

v1.10.1

09 May 15:54
fc055b1
Compare
Choose a tag to compare

Changes since v1.10.0

  • Tag to digest minimum TLS version was reverted back to 1.2. (#13963, @dprotaso)
    • Higher TLS versions can be configured using the controller environment variable TAG_TO_DIGEST_TLS_MIN_VERSION and supports values "1.2" and "1.3"

v1.10.0

25 Apr 19:00
2c1bb07
Compare
Choose a tag to compare

Changes since v1.9

Note: some container image registries support only TLS v1.2 (quay.io) so we reverted the change min TLS 1.3 change in v1.10.1 and made it configurable

🚨 Breaking or Notable

  • Container-freezer has been sunset in Knative v1.10. (#13830, @psschwei)
  • Controller uses TLS 1.3 as the minimum version when communicating with image registries for tag to digest resolution (#13886, @izabelacg)

💫 New Features & Changes

  • Adds support for downwardAPI sources in projected volumes on Knative Services (#13896, @KauzClay)
  • Controllers now have liveness and readiness probes (#13563, @skonto)
  • With enabling internal-encryption, activator pods needed to be restarted when certificates are updated. The restart is not necessary anymore. (#13854, @nak3)
  • ImagePullSecrets with references to unknown service accounts won't error out anymore but fail silently like Kubernetes. (#13701, @Bisht13)

🐞Bug Fixes

  • Fixes issue where certificates would not get renewed when using auto-tls. (#13666, @KauzClay)
  • Fix queue proxy not draining connections on shutdown (#13815, @dprotaso)

Dependencies

Added
  • cloud.google.com/go/asset: v1.5.0
  • cloud.google.com/go/iam: v0.3.0
  • cloud.google.com/go/security: v1.5.0
  • github.com/Azure/go-ansiterm: d185dfc
  • github.com/aws/aws-sdk-go-v2/service/ssooidc: v1.13.6
  • github.com/buger/jsonparser: v1.1.1
  • github.com/flowstack/go-jsonschema: v0.1.1
  • github.com/googleapis/enterprise-certificate-proxy: v0.1.0
  • github.com/googleapis/go-type-adapters: v1.0.0
  • github.com/moby/term: 9d4ed18
  • github.com/morikuni/aec: v1.0.0
Changed
Read more

v1.9.3

04 Apr 11:30
92301fb
Compare
Choose a tag to compare

Changes since 1.9.2

  • Our queue proxy shutdown now performs a graceful shutdown (#13829, @dprotaso)

🚨 Notable

Knative Serving release v1.8.6

04 Apr 11:32
fc9c130
Compare
Choose a tag to compare

Changes since 1.8.5

v1.9.2

28 Feb 11:21
129931f
Compare
Choose a tag to compare

Changes since 1.9.1

Rebuilt with go1.19.6 to address CVEs

🚨 Notable

v1.8.5

28 Feb 23:19
0ad6c37
Compare
Choose a tag to compare

v1.9.1

27 Feb 16:47
aaa1073
Compare
Choose a tag to compare

Changes since 1.9.0

Bumped dependencies to address CVEs

🚨 Notable

v1.8.4

27 Feb 16:47
8cfcf8f
Compare
Choose a tag to compare
tags: Release Notes Serving

Changes since 1.8.3

Bumped dependencies to address CVEs

Changes since 1.8.2

Changes since 1.8.1

  • Bump apiVersion of the webhook's HorizontalPodAutoscaler to autoscaling/v2 (#13521, @psschwei)

Changes since 1.8.0

Changelog since 1.7

🚨 Breaking or Notable

  • Uses the cluster domain suffix svc.cluster.local as the default domain. As routes using the cluster domain suffix are not exposed through Ingress, users will need to configure DNS in order to expose their services (most users probably already are). (#13259, @psschwei)
  • Upgrade HorizontalPodAutoscaler to autoscaling/v2 API version (#13337, @nader-ziada)
  • Services may now set seccompProfile in SecurityContext to allow users to comply with the restricted Pod Security Standards best-practice (#13401, @evankanderson)
  • Bump min-version to k8s 1.23, so removing kind 1.22 testing (#13357, @nader-ziada)
  • Increase the outbound context deadline in reconcilers to 30s (from 10s) to match the maximum K8s webhook timeout. (#13323, @mattmoor)

💫 New Features & Changes

Bug or Regression

  • Knative services can now specify securityContext.allowPrivilegeEscalation (#13395, @mattmoor)
  • ConfigMap config-defaults property revision-response-start-timeout-seconds now defaults to revision-timeout-seconds. This should unblock upgrades who set revision-timeout-seconds lower than the default value of 300 (#13255, @dprotaso)
  • Fix LatestReadyRevision semantics so it only advances forward. When a Revision fails the Configuration & Route will no longer fall back to older revision. The exception is when you rollback to a Revision that is explicitly named. (#13239, @dprotaso)

Dependencies

Added
  • github.com/armon/go-socks5: e753329
  • github.com/cyberdelia/templates: ca7fffd
  • github.com/deepmap/oapi-codegen: v1.8.2
  • github.com/emicklei/go-restful/v3: v3.8.0
  • github.com/go-chi/chi/v5: v5.0.0
  • github.com/google/gnostic: v0.5.7-v3refs
  • github.com/influxdata/influxdb-client-go/v2: v2.9.0
  • github.com/influxdata/line-protocol: 2487e72
  • github.com/labstack/echo/v4: v4.2.1
  • github.com/labstack/gommon: v0.3.0
  • github.com/matryer/moq: 6cfb055
  • github.com/onsi/ginkgo/v2: v2.1.6
  • github.com/valyala/fasttemplate: v1.2.1
Changed
  • github.com/Azure/go-autorest/autorest/adal: v0.9.18 → v0.9.20
  • github.com/Azure/go-autorest/autorest/mocks: v0.4.1 → v0.4.2
  • github.com/Azure/go-autorest/autorest: v0.11.24 → v0.11.27
  • github.com/antlr/antlr4/runtime/Go/antlr: b48c857 → f25a4f6
  • github.com/cloudevents/sdk-go/v2: v2.4.1 → v2.12.0
  • github.com/cockroachdb/datadriven: bf6692d → 80d97fb
  • github.com/creack/pty: v1.1.11 → v1.1.9
  • github.com/envoyproxy/go-control-plane: cf90f65 → 49ff273
  • github.com/go-logr/logr: v1.2.2 → v1.2.3
  • github.com/google/cel-go: v0.9.0 → v0.12.5
  • github.com/google/go-cmp: v0.5.7 → v0.5.8
  • github.com/onsi/gomega: v1.16.0 → v1.20.1
  • github.com/prometheus/client_golang: v1.11.1 → v1.12.1
  • github.com/spf13/cobra: v1.3.0 → v1.4.0
  • github.com/stretchr/testify: v1.7.0 → v1.8.0
  • github.com/yuin/goldmark: v1.4.1 → v1.4.13
  • go.etcd.io/etcd/api/v3: v3.5.0 → v3.5.4
  • go.etcd.io/etcd/client/pkg/v3: v3.5.0 → v3.5.4
  • go.etcd.io/etcd/client/v2: v2.305.0 → v2.305.4
  • go.etcd.io/etcd/client/v3: v3.5.0 → v3.5.4
  • go.etcd.io/etcd/pkg/v3: v3.5.0 → v3.5.4
  • go.etcd.io/etcd/raft/v3: v3.5.0 → v3.5.4
  • go.etcd.io/etcd/server/v3: v3.5.0 → v3.5.4
  • golang.org/x/crypto: 8634188 → 3147a52
  • golang.org/x/mod: v0.5.1 → 86c51ed
  • golang.org/x/net: 27dd868 → a158d28
  • golang.org/x/sys: 4e6760a → 8c9f86f
  • golang.org/x/tools: v0.1.9 → v0.1.12
  • google.golang.org/genproto: 1ac2ace → c8bf987
  • google.golang.org/grpc: v1.44.0 → v1.47.0
  • google.golang.org/protobuf: v1.27.1 → v1.28.0
  • k8s.io/api: v0.23.9 → v0.25.2
  • k8s.io/apiextensions-apiserver: v0.23.9 → v0.25.2
  • k8s.io/apimachinery: v0.23.9 → v0.25.2
  • k8s.io/apiserver: v0.23.9 → v0.25.2
  • k8s.io/client-go: v0.23.9 → v0.25.2
  • k8s.io/code-generator: v0.23.9 → v0.25.2
  • k8s.io/component-base: v0.23.9 → v0.25.2
  • k8s.io/kube-openapi: 4241196 → 67bda5d
  • k8s.io/utils: 3a6ce19 → ee6ede2
  • knative.dev/caching: 9df7bb7 → ce26e92
  • knative.dev/control-protocol: f18dbde → 3e2f878
  • knative.dev/hack: 8d1e4cc → 3fdc50b
  • knative.dev/networking: e51df7c → 58f3e62
  • knative.dev/pkg: 4a03844 → 714b763
  • knative.dev/reconciler-test: 177f826 → 090970c
  • sigs.k8s.io/apiserver-network-proxy/konnectivity-client: v0.0.30 → v0.0.32
  • sigs.k8s.io/json: 9f7c6b3 → f223a00
  • sigs.k8s.io/structured-merge-diff/v4: v4.2.1 → v4.2.3
Removed