serving

Kubernetes-based, scale-to-zero, request-driven compute

APACHE-2.0 License

Stars
5.3K
Committers
296

Bot releases are visible (Hide)

serving - Knative Serving release v1.1.0

Published by knative-prow-releaser-robot almost 3 years ago

Release notes for Serving 1.1

tags: Release Notes Serving

Changelog since 1.0

🚨 Breaking or Notable

πŸ’« New Features & Changes

  • Add cluster wide default min-scale (#12290, @nader-ziada)
  • HPA autoscaler stabilization window can be set from autoscaling window annotation (#12286, @enoodle)
  • Metrics with names other than "cpu" or "memory" are allowed as pod custom metrics. (#12277, @enoodle)

🐞 Bug Fixes

Uncategorized

  • Allow setting TCP and HTTP port to be equal to containerPort on readiness and liveness probes. (#12225, @evankanderson)
  • Drops the unix socket listener from Queue Proxy, since it is no longer used (#12298, @julz)
  • Generated HPAs are now v2beta2.
    Window annotation will be set to HPA stabilization window (#12278, @enoodle)
  • Remove performance tests using Mako (#12266, @nader-ziada)
  • The activator optimisation which directly probes the queue proxy for readiness rather than waiting for Kubernetes to report readiness is now disabled when exec probes are used (since queue proxy cannot execute these probes on the user container's behalf). (#12250, @julz)
  • Use pkg/drain in queue proxy (#12033, @nader-ziada)

Dependencies

  • github.com/Shopify/toxiproxy/v2: 15ea381
  • github.com/bits-and-blooms/bitset: v1.2.0
  • github.com/cenkalti/backoff/v4: v4.1.1
  • github.com/checkpoint-restore/go-criu/v5: v5.0.0
  • github.com/danieljoos/wincred: v1.1.0
  • github.com/fortytw2/leaktest: v1.3.0
  • github.com/go-task/slim-sprig: 348f09d
  • github.com/gorilla/securecookie: v1.1.1
  • github.com/gorilla/sessions: v1.2.1
  • github.com/jcmturner/aescts/v2: v2.0.0
  • github.com/jcmturner/dnsutils/v2: v2.0.0
  • github.com/jcmturner/gofork: v1.0.0
  • github.com/jcmturner/goidentity/v6: v6.0.1
  • github.com/jcmturner/gokrb5/v8: v8.4.2
  • github.com/jcmturner/rpc/v2: v2.0.3
  • github.com/rabbitmq/amqp091-go: v1.1.0
  • github.com/urfave/cli/v2: v2.3.0
  • github.com/vbatts/tar-split: v0.11.2
  • github.com/xdg-go/pbkdf2: v1.0.0
  • github.com/xdg-go/scram: v1.0.2
  • github.com/xdg-go/stringprep: v1.0.2
  • github.com/kballard/go-shellquote: 95032a8
  • github.com/stoewer/go-strcase: v1.2.0
serving - Knative Serving release v0.26.1

Published by knative-prow-releaser-robot almost 3 years ago

Changelog since 0.25

🚨 Breaking or Notable

  • Kubernetes 1.20 is now required

πŸ’« New Features & Changes

  • Allow users to set container[*].securityContext.runAsGroup (#12003, @dprotaso)

  • A new setting, mesh-compatibility-mode, in the networking config map allows an administrator
    to explicitly tell Activator and Autoscaler to use Direct Pod IP (most efficient, but not compatible
    with mesh being enabled), Cluster IP (less efficient, but needed if mesh is enabled), or to
    Autodetect (the current behaviour, and the default, causes Activator and Autoscaler to first attempt
    Direct Pod IP communication, and then fall back to Cluster IP if it sees a mesh-related error status
    code). (#11999, @julz)

🐞 Bug Fixes

Uncategorized

  • Adds more debug logs to background digest resolver (#11959, @julz)
  • Dropped the startup probe on the queue-proxy which makes the pods start ~500ms quicker on average. (#11965, @markusthoemmes)
  • Removes the ServiceName field from RevisionStatus which has been deprecated for several releases. This field was effectively equal to the revision name. (#11817, @julz)
  • User-supplied readinessProbes with a probePeriod set greater than zero are no longer silently ignored after pod startup. (#11190, @julz)
  • When enabled, queue proxy tracks the request count for each pod (disabled by default) (#11783, @psschwei)

Dependencies

  • github.com/moby/spdystream: v0.2.0
  • k8s.io/controller-manager: v0.21.0
  • contrib.go.opencensus.io/exporter/prometheus: v0.3.0 β†’ v0.4.0
  • github.com/NYTimes/gziphandler: 56545f4 β†’ v1.1.1
  • github.com/containerd/stargz-snapshotter/estargz: v0.6.4 β†’ v0.7.0
  • github.com/creack/pty: v1.1.9 β†’ v1.1.11
  • github.com/go-kit/kit: v0.10.0 β†’ v0.9.0
  • github.com/golang/groupcache: 8c9f03a β†’ 41bb18b
  • github.com/google/go-containerregistry/pkg/authn/k8schain: c086c7f β†’ ce35c99
  • github.com/google/go-containerregistry: b448aba β†’ v0.6.0
  • github.com/hashicorp/consul/api: v1.3.0 β†’ v1.1.0
  • github.com/hashicorp/consul/sdk: v0.3.0 β†’ v0.1.1
  • github.com/moby/term: 672ec06 β†’ df9cb8a
  • github.com/pierrec/lz4: v2.0.5+incompatible β†’ 473cd7c
  • github.com/prometheus/common: v0.26.0 β†’ v0.30.0
  • github.com/prometheus/statsd_exporter: v0.20.0 β†’ v0.21.0
  • github.com/streadway/amqp: edfb901 β†’ 75d898a
  • github.com/vdemeester/k8s-pkg-credentialprovider: v1.20.7 β†’ v1.21.0-1
  • go.uber.org/zap: v1.18.1 β†’ v1.19.0
  • golang.org/x/crypto: c07d793 β†’ 32db794
  • golang.org/x/net: c6fcb2d β†’ e898025
  • golang.org/x/oauth2: a41e5a7 β†’ 2bc19b1
  • golang.org/x/term: 2321bbc β†’ 6a3ed07
  • golang.org/x/time: 38a9dc6 β†’ 1f47c86
  • google.golang.org/grpc: v1.39.0 β†’ v1.40.0
  • gopkg.in/gcfg.v1: v1.2.3 β†’ v1.2.0
  • gopkg.in/warnings.v0: v0.1.2 β†’ v0.1.1
  • k8s.io/api: v0.20.7 β†’ v0.21.4
  • k8s.io/apiextensions-apiserver: v0.20.7 β†’ v0.21.4
  • k8s.io/apimachinery: v0.20.7 β†’ v0.21.4
  • k8s.io/apiserver: v0.20.7 β†’ v0.21.4
  • k8s.io/client-go: v0.20.7 β†’ v0.21.4
  • k8s.io/cloud-provider: v0.19.7 β†’ v0.21.0
  • k8s.io/code-generator: v0.20.7 β†’ v0.21.4
  • k8s.io/component-base: v0.20.7 β†’ v0.21.4
  • k8s.io/csi-translation-lib: v0.19.7 β†’ v0.21.0
  • k8s.io/klog/v2: v2.5.0 β†’ v2.8.0
  • k8s.io/kube-openapi: 8566a33 β†’ 591a79e
  • k8s.io/legacy-cloud-providers: v0.19.7 β†’ v0.21.0
  • knative.dev/caching: 4e553d2 β†’ 0184eb9
  • knative.dev/hack: e28525d β†’ 815cd31
  • knative.dev/networking: acdfd41 β†’ 69ad454
  • knative.dev/pkg: 21eb4c1 β†’ 5ae4821
  • sigs.k8s.io/apiserver-network-proxy/konnectivity-client: v0.0.15 β†’ v0.0.22
  • sigs.k8s.io/structured-merge-diff/v4: v4.0.3 β†’ v4.1.2
  • github.com/Knetic/govaluate: 9aa4983
  • github.com/VividCortex/gohistogram: v1.0.0
  • github.com/afex/hystrix-go: fa1af6a
  • github.com/apache/thrift: v0.13.0
  • github.com/aryann/difflib: e206f87
  • github.com/aws/aws-lambda-go: v1.13.3
  • github.com/aws/aws-sdk-go-v2: v0.18.0
  • github.com/casbin/casbin/v2: v2.1.2
  • github.com/cenkalti/backoff: v2.2.1+incompatible
  • github.com/clbanning/x2j: 8252494
  • github.com/codahale/hdrhistogram: 3a0bb77
  • github.com/edsrzf/mmap-go: v1.0.0
  • github.com/franela/goblin: c9ffbef
  • github.com/franela/goreq: bcd34c9
  • github.com/go-sql-driver/mysql: v1.4.0
  • github.com/hashicorp/go-version: v1.2.0
  • github.com/hudl/fargo: v1.3.0
  • github.com/influxdata/influxdb1-client: 8bf82d3
  • github.com/lightstep/lightstep-tracer-common/golang/gogo: bc2310a
  • github.com/lightstep/lightstep-tracer-go: v0.18.1
  • github.com/nats-io/jwt: v0.3.2
  • github.com/nats-io/nats-server/v2: v2.1.2
  • github.com/nats-io/nats.go: v1.9.1
  • github.com/nats-io/nkeys: v0.1.3
  • github.com/nats-io/nuid: v1.0.1
  • github.com/oklog/oklog: v0.3.2
  • github.com/oklog/run: v1.0.0
  • github.com/op/go-logging: 970db52
  • github.com/opentracing-contrib/go-observer: a52f234
  • github.com/opentracing/basictracer-go: v1.0.0
  • github.com/opentracing/opentracing-go: v1.1.0
  • github.com/openzipkin-contrib/zipkin-go-opentracing: v0.4.5
  • github.com/pact-foundation/pact-go: v1.0.4
  • github.com/pborman/uuid: v1.2.0
  • github.com/performancecopilot/speed: v3.0.0+incompatible
  • github.com/samuel/go-zookeeper: 2cc03de
  • github.com/sony/gobreaker: v0.4.1
  • github.com/streadway/handy: d5acb31
  • go.uber.org/tools: 2cfd321
  • sourcegraph.com/sourcegraph/appdash: ebfcffb
serving - Knative Serving release v0.25.2

Published by knative-prow-releaser-robot almost 3 years ago

🚨 Breaking or Notable

1. Fixes for K8s 1.22

Related issue: https://github.com/knative/serving/issues/11448

Our webhook parser no longer rejects unknown fields in an object's metadata. New fields were introduced in K8s 1.22 which caused Knative's webhook to reject certain operations.

2. Renaming of some net-kourier components

Related issue: knative/networking#448

As part of our efforts to GA/1.0 we've standardized on the naming of our networking plugins that are installed along side Serving. If you're managing your Knative deployment manually with kubectl this will require a two-phase upgrade process. In order to upgrade net-kourier to v0.25.0 using kubectl please follow the steps:

# Apply the new release
$ kubectl apply -f net-kourier.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-kourier.yaml \
  --prune -l networking.knative.dev/ingress-provider=kourier

3. Disabling namespace certificate provisioning legacy label

The namespace label networking.internal.knative.dev/disableWildcardCert has been deprecated since v0.15.0 release in favour of networking.knative.dev/disableWildcardCert. We have dropped support for this legacy label. (#11626, @nak3)

πŸ’« New Features & Changes

  • A feature flag is available to enable priorityClassName for Knative Services. See config-features for details. (#11746, @nealhu)
  • Add memory metrics for HPA: hpa.autoscaling.knative.dev (#11668, @zhaojizhuang)
  • Added app.kubernetes.io/name labels to resources. It will be replacing app labels in the future. (#11655, @upodroid)
  • Containers[*].securityContext.runAsNonRoot can be set to true without a feature flag (#11606, @senthilnathan)
  • Users can set spec.template.spec.automountServiceAccountToken to false in a PodSpec in order to opt-out of Kubenetes' default behaviour of mounting a ServiceAccount token in that Pod's containers. (#11723, @psschwei)
  • Add v1beta1 version of DomainMapping crd (#11682, @julz)

🐞 Bug Fixes

  • Set ENABLE_HTTP2_AUTO_DETECTION to false by default if the feature is not enabled. (#11760, @psschwei)

Dependencies

  • github.com/benbjohnson/clock: v1.1.0
  • github.com/cncf/xds/go: fbca930
  • github.com/kr/fs: v0.1.0
  • github.com/pkg/sftp: v1.10.1
  • go.etcd.io/etcd/api/v3: v3.5.0
  • go.etcd.io/etcd/client/pkg/v3: v3.5.0
  • go.etcd.io/etcd/client/v2: v2.305.0
  • go.opentelemetry.io/proto/otlp: v0.7.0
  • contrib.go.opencensus.io/exporter/stackdriver: v0.13.5
  • github.com/remyoudompheng/bigfft: 52369c6
  • modernc.org/cc: v1.0.0
  • modernc.org/golex: v1.0.0
  • modernc.org/mathutil: v1.0.0
  • modernc.org/strutil: v1.0.0
  • modernc.org/xc: v1.0.0
serving - Knative Serving release v0.24.2

Published by knative-prow-releaser-robot almost 3 years ago

Changes by Kind

🚨 Breaking or Notable

1. Renaming of some net-* components

Related issue: knative/networking#448

As part of our efforts to GA/1.0 we've standardized on the naming of our networking plugins that are installed along side Serving. If you're managing your Knative deployment manually with kubectl this will require a two-phase upgrade process. Please see the below sections:

Upgrade of net-http01 to v0.24.0
# Apply the new release
$ kubectl apply -f net-http01.yaml

# Once the deployment is ready delete the old resources
$ kubectl delete deployment http01-controller -n knative-serving
$ kubectl delete service challenger -n knative-serving
Upgrade of net-certmanager to v0.24.0
# Apply the new release
$ kubectl apply -f net-certmanager.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-certmanager.yaml \
  --prune -l networking.knative.dev/certificate-provider=cert-manager
Upgrade net-istio to v0.24.0
# Apply the new release
$ kubectl apply -f net-istio.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-istio.yaml \
  --prune -l networking.knative.dev/ingress-provider=istio
Upgrade of net-contour to v0.24.0
# Apply the new release
$ kubectl apply -f net-contour.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-contour.yaml -f contour.yaml \
  --prune -l networking.knative.dev/ingress-provider=contour
Upgrade of namespace certificate controller to v0.24.0
# Apply the new release
$ kubectl apply -f serving-nscert.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f serving-nscert.yaml \
  --prune -l networking.knative.dev/wildcard-certificate-provider=nscert
Upgrade of net-kourier to v0.24.0

At this point we've defered the renaming to net-kourier until the next release. We're looking to ensure there is no traffic disruption as part of the upgrade. Thus upgrading to v0.24.0 requires no special instructions.

2. Kubernetes 1.19 is now required

As part of our Kubernetes Minimum Version Principle we now have a hard requirement on Kubernetes Version 1.19.

3. Webhook/Controller RBAC changes

The recommended way to delete a Knative installation is to run kubectl delete -f serving-core.yaml and other release YAMLs you may have applied. There's been a misconception that deleting the knative-serving namespace will perform a similar cleanup but this does not remove cluster scoped resources. In prior releases the cluster state would have prevented the reinstall of Knative Serving. We've addressed this problem but it will require some RBAC permissions on namespaces & finalizers.

Please see the relevant issues & PRs:

4. DomainMapping feature is now BETA

This means it is built in to the main serving-core yaml by default. It is still possible to opt out of the feature by setting replica count of the domainmapping-controller to zero.

As part of this transition the default value for autocreateClusterDomainClaims in the config-network config map has been changed to false meaning cluster-wide permissions are required to delegate the ability to create particular DomainMappings to namespaces.Single tenant clusters may wish to allow arbitrary users to create Domain Mappings by changing this value back to true. (#11573, @julz)

πŸ’« New Features & Changes

  • Allow dropping capabilities from a container's security context (#11344, @psschwei)
  • Domainmapping can now specify a tls secret to be used as the https certificate (#11250, @shinigambit)
  • Provides a feature gate that, when enabled, allows adding capabilities from a container's security context (#11410, @psschwei)
  • defaultExternalScheme can now be used to default routes to surface a URL scheme of your choice rather than the default "http". (#11480, @markusthoemmes)
  • Optimized generated routes to minimize Envoy configuration size (net-istio#632, @howardjohn)
  • Rename Contonr's ClusterRole and ClusterRoleBinding to differ from existing contour installation (net-contour#500, @izabelacg)
  • Add a new ConfigMap config-kourier, with the initial enable-service-access-logging setting (net-kourier#523, @markusthoemmes)

🐞 Bug Fixes

  • Fixed a bug where traffic would briefly be routed 'wrong', leading to errors due to exceeded queues in deployments with a large activator count and a low service pod count. (#11375, @markusthoemmes)
  • Traffic status in Route is updated whenever traffic configuration was wrong. (#11477, @nak3)
  • Validates, consistently with other configmaps, that the _example section of the features configmap is not accidentally modified. (#11391, @julz)

Dependencies Changes

  • bazil.org/fuse: 371fbbd
  • cloud.google.com/go/firestore: v1.1.0
  • github.com/Microsoft/hcsshim/test: 43a75bb
  • github.com/Microsoft/hcsshim: v0.8.16
  • github.com/Shopify/logrus-bugsnag: 577dee2
  • github.com/alexflint/go-filemutex: 72bdc8e
  • github.com/bitly/go-simplejson: v0.5.0
  • github.com/bketelsen/crypt: 5cbc8cc
  • github.com/bmizerany/assert: b7ed37b
  • github.com/bshuster-repo/logrus-logstash-hook: v0.4.1
  • github.com/buger/jsonparser: f4dd9f5
  • github.com/bugsnag/bugsnag-go: b1d1530
  • github.com/bugsnag/osext: 0dd3f91
  • github.com/bugsnag/panicwrap: e2c2850
  • github.com/checkpoint-restore/go-criu/v4: v4.1.0
  • github.com/cilium/ebpf: v0.4.0
  • github.com/containerd/aufs: v1.0.0
  • github.com/containerd/btrfs: v1.0.0
  • github.com/containerd/cgroups: v1.0.1
  • github.com/containerd/console: v1.0.2
  • github.com/containerd/continuity: v0.1.0
  • github.com/containerd/fifo: v1.0.0
  • github.com/containerd/go-cni: v1.0.2
  • github.com/containerd/go-runc: v1.0.0
  • github.com/containerd/imgcrypt: v1.1.1
  • github.com/containerd/nri: v0.1.0
  • github.com/containerd/ttrpc: v1.0.2
  • github.com/containerd/typeurl: v1.0.2
  • github.com/containerd/zfs: v1.0.0
  • github.com/containernetworking/cni: v0.8.1
  • github.com/containernetworking/plugins: v0.9.1
  • github.com/containers/ocicrypt: v1.1.1
  • github.com/coreos/go-iptables: v0.5.0
  • github.com/coreos/go-systemd/v22: v22.1.0
  • github.com/cyphar/filepath-securejoin: v0.2.2
  • github.com/d2g/dhcp4: a1d1b6c
  • github.com/d2g/dhcp4client: v1.0.0
  • github.com/d2g/dhcp4server: 7d4a0a7
  • github.com/d2g/hardwareaddr: e7d9fbe
  • github.com/denverdino/aliyungo: a747050
  • github.com/docker/go-events: e31b211
  • github.com/docker/go-metrics: v0.0.1
  • github.com/docker/libtrust: fa56704
  • github.com/evanphx/json-patch/v5: v5.5.0
  • github.com/frankban/quicktest: v1.11.3
  • github.com/fullsailor/pkcs7: d7302db
  • github.com/garyburd/redigo: 535138d
  • github.com/go-ini/ini: v1.25.4
  • github.com/go-kit/log: v0.1.0
  • github.com/godbus/dbus/v5: v5.0.3
  • github.com/godbus/dbus: ade71ed
  • github.com/gorilla/handlers: 60c7bfd
  • github.com/j-keck/arping: 2cf9dc6
  • github.com/jessevdk/go-flags: v1.4.0
  • github.com/klauspost/compress: v1.13.0
  • github.com/marstr/guid: v1.1.0
  • github.com/mattn/go-shellwords: v1.0.3
  • github.com/miekg/pkcs11: v1.0.3
  • github.com/mistifyio/go-zfs: f784269
  • github.com/mitchellh/osext: 5e2d6d4
  • github.com/moby/locker: v1.0.1
  • github.com/moby/sys/mountinfo: v0.4.1
  • github.com/moby/sys/symlink: v0.1.0
  • github.com/mrunalp/fileutils: v0.5.0
  • github.com/ncw/swift: v1.0.47
  • github.com/opencontainers/runc: v1.0.0-rc93
  • github.com/opencontainers/runtime-spec: e6143ca
  • github.com/opencontainers/runtime-tools: 1d69bd0
  • github.com/opencontainers/selinux: v1.8.0
  • github.com/safchain/ethtool: 42ed695
  • github.com/seccomp/libseccomp-golang: v0.9.1
  • github.com/stefanberger/go-pkcs11uri: 78d3cae
  • github.com/subosito/gotenv: v1.2.0
  • github.com/syndtr/gocapability: 42c35b4
  • github.com/tchap/go-patricia: v2.2.6+incompatible
  • github.com/vishvananda/netlink: d40f988
  • github.com/vishvananda/netns: db3c7e5
  • github.com/willf/bitset: v1.1.11
  • github.com/xeipuuv/gojsonpointer: 4e3ac27
  • github.com/xeipuuv/gojsonreference: bd5ef7b
  • github.com/xeipuuv/gojsonschema: 1d52303
  • github.com/yvasiyarov/go-metrics: 57bccd1
  • github.com/yvasiyarov/gorelic: a9bba5b
  • github.com/yvasiyarov/newrelic_platform_go: b21fdbd
  • go.mozilla.org/pkcs7: 432b235
  • google.golang.org/cloud: 975617b
  • google.golang.org/grpc/cmd/protoc-gen-go-grpc: v1.1.0
  • gopkg.in/airbrake/gobrake.v2: v2.0.9
  • gopkg.in/gemnasium/logrus-airbrake-hook.v2: v2.1.2
  • gopkg.in/ini.v1: v1.51.0
  • k8s.io/cri-api: v0.20.6
  • k8s.io/kubernetes: v1.13.0
  • github.com/agnivade/levenshtein: v1.0.1
  • github.com/andreyvit/diff: c7f18ee
  • github.com/globalsign/mgo: eeefdec
  • github.com/go-openapi/analysis: v0.19.5
  • github.com/go-openapi/errors: v0.19.2
  • github.com/go-openapi/loads: v0.19.4
  • github.com/go-openapi/runtime: v0.19.4
  • github.com/go-openapi/strfmt: v0.19.3
  • github.com/go-openapi/validate: v0.19.5
  • github.com/joefitzgerald/rainbow-reporter: v0.1.0
  • github.com/maxbrunsfeld/counterfeiter/v6: v6.2.2
  • github.com/sclevine/spec: v1.2.0
  • github.com/tidwall/pretty: v1.0.0
  • github.com/vektah/gqlparser: v1.1.2
  • go.mongodb.org/mongo-driver: v1.1.2
  • gopkg.in/evanphx/json-patch.v4: v4.9.0
serving - Knative Serving release v1.0.1

Published by knative-prow-releaser-robot almost 3 years ago

🚨 Breaking or Notable

  • The per-namespace wildcard certificate provisioner has been integrated into the base controllers
    and is now controlled by the namespace-wildcard-cert-selector field. This field allows you
    to use a Kubernetes LabelSelector to choose which namespaces should have certificates
    provisioned.

    To migrate existing usage of the serving-nscert controller, do the following:

    1. Set the namespace-wildcard-cert-selector to the value:

      matchExpressions:
       - key: "networking.knative.dev/disableWildcardCert"
         operator: "NotIn"
         values: ["true"]
      
    2. Remove the Deployment, Service and ClusterRole defined by the serving-nscert.yaml resources
      in the previous release. (#12174, @evankanderson)

πŸ’« New Features & Changes

  • Per-namespace wildcard certificate provisioning has been integrated into the main
    Knative controllers and is no longer a separate install. It is now controlled by a
    label selector on Kubernetes namespaces.
  • A new experimental feature, "concurrencyStateEndpoint", allows a webhook to be informed when a container's concurrency goes to/from zero (#11802, #12162, #11917, @psschwei)
  • When mesh compatibility mode is not set to "auto" in the networking config map,
    the activator will respect Kubernetes's readiness state and avoid probing when
    kubernetes readiness propagates more quickly than the activator's probe. (#12086, @julz)

🐞 Bug Fixes

  • Fixes an issue where TLS certificates are requested before domain-ownership is established. (#12080, @mattmoor)

Dependencies

Added

Nothing has changed.

Changed

  • cloud.google.com/go/storage: v1.10.0 β†’ v1.18.2
  • cloud.google.com/go: v0.84.0 β†’ v0.97.0
  • github.com/cncf/xds/go: fbca930 β†’ aa0b789
  • github.com/envoyproxy/go-control-plane: 63b5d3c β†’ cf90f65
  • github.com/golang/mock: v1.5.0 β†’ v1.6.0
  • github.com/google/pprof: 01bbb19 β†’ 4bb14d4
  • github.com/googleapis/gax-go/v2: v2.0.5 β†’ v2.1.1
  • github.com/prometheus/common: v0.30.0 β†’ v0.31.1
  • github.com/yuin/goldmark: v1.3.5 β†’ v1.4.0
  • go.uber.org/goleak: v1.1.10 β†’ 6911603
  • go.uber.org/zap: v1.19.0 β†’ v1.19.1
  • golang.org/x/net: e898025 β†’ 4f30a5c
  • golang.org/x/oauth2: 2bc19b1 β†’ 6b3c2da
  • golang.org/x/sys: 59db8d7 β†’ d61c044
  • golang.org/x/tools: v0.1.5 β†’ v0.1.7
  • google.golang.org/api: v0.50.0 β†’ v0.58.0
  • google.golang.org/genproto: 8bfb893 β†’ 37fc393
  • google.golang.org/grpc: v1.40.0 β†’ v1.41.0
  • k8s.io/gengo: de9496d β†’ 39e73c8
  • knative.dev/caching: 0184eb9 β†’ f2af269
  • knative.dev/hack: 815cd31 β†’ b96d65a
  • knative.dev/networking: 69ad454 β†’ c3606d9
  • knative.dev/pkg: 5ae4821 β†’ 5d9d300
  • sigs.k8s.io/yaml: v1.2.0 β†’ v1.3.0

Removed

Nothing has changed.

serving - Knative Serving release v1.0.0

Published by knative-prow-releaser-robot almost 3 years ago

🚨 Breaking or Notable

  • The per-namespace wildcard certificate provisioner has been integrated into the base controllers
    and is now controlled by the namespace-wildcard-cert-selector field. This field allows you
    to use a Kubernetes LabelSelector to choose which namespaces should have certificates
    provisioned.

    To migrate existing usage of the serving-nscert controller, do the following:

    1. Set the namespace-wildcard-cert-selector to the value:

      matchExpressions:
       - key: "networking.knative.dev/disableWildcardCert"
         operator: "NotIn"
         values: ["true"]
      
    2. Remove the Deployment, Service and ClusterRole defined by the serving-nscert.yaml resources
      in the previous release. (#12174, @evankanderson)

πŸ’« New Features & Changes

  • Per-namespace wildcard certificate provisioning has been integrated into the main
    Knative controllers and is no longer a separate install. It is now controlled by a
    label selector on Kubernetes namespaces.
  • A new experimental feature, "concurrencyStateEndpoint", allows a webhook to be informed when a container's concurrency goes to/from zero (#11802, #12162, #11917, @psschwei)
  • When mesh compatibility mode is not set to "auto" in the networking config map,
    the activator will respect Kubernetes's readiness state and avoid probing when
    kubernetes readiness propagates more quickly than the activator's probe. (#12086, @julz)

🐞 Bug Fixes

  • Fixes an issue where TLS certificates are requested before domain-ownership is established. (#12080, @mattmoor)

Dependencies

Added

Nothing has changed.

Changed

  • cloud.google.com/go/storage: v1.10.0 β†’ v1.18.2
  • cloud.google.com/go: v0.84.0 β†’ v0.97.0
  • github.com/cncf/xds/go: fbca930 β†’ aa0b789
  • github.com/envoyproxy/go-control-plane: 63b5d3c β†’ cf90f65
  • github.com/golang/mock: v1.5.0 β†’ v1.6.0
  • github.com/google/pprof: 01bbb19 β†’ 4bb14d4
  • github.com/googleapis/gax-go/v2: v2.0.5 β†’ v2.1.1
  • github.com/prometheus/common: v0.30.0 β†’ v0.31.1
  • github.com/yuin/goldmark: v1.3.5 β†’ v1.4.0
  • go.uber.org/goleak: v1.1.10 β†’ 6911603
  • go.uber.org/zap: v1.19.0 β†’ v1.19.1
  • golang.org/x/net: e898025 β†’ 4f30a5c
  • golang.org/x/oauth2: 2bc19b1 β†’ 6b3c2da
  • golang.org/x/sys: 59db8d7 β†’ d61c044
  • golang.org/x/tools: v0.1.5 β†’ v0.1.7
  • google.golang.org/api: v0.50.0 β†’ v0.58.0
  • google.golang.org/genproto: 8bfb893 β†’ 37fc393
  • google.golang.org/grpc: v1.40.0 β†’ v1.41.0
  • k8s.io/gengo: de9496d β†’ 39e73c8
  • knative.dev/caching: 0184eb9 β†’ f2af269
  • knative.dev/hack: 815cd31 β†’ b96d65a
  • knative.dev/networking: 69ad454 β†’ c3606d9
  • knative.dev/pkg: 5ae4821 β†’ 5d9d300
  • sigs.k8s.io/yaml: v1.2.0 β†’ v1.3.0

Removed

Nothing has changed.

serving - Knative Serving release v0.23.3

Published by knative-prow-releaser-robot about 3 years ago

🚨 Breaking or Notable

  • Change the default post-install job to use sslip.io rather than xip.io. (#11298, @julz)

πŸ’« New Features & Changes

  • The stats scraping in the autoscaler is now sensitive to the EnableMeshPodAddressability setting. A restart of the autoscaler is required for the setting to take effect if changed. (#11161, @markusthoemmes)
  • The state keeping in the activator is now sensitive to the EnableMeshPodAddressability setting. A restart of the activator is required for the setting to take effect if changed. (#11172, @markusthoemmes)
  • Tightens the heuristic for mesh being abled in the service scraper. We now expect all errors to be related to mesh (i.e. 503 status code). This prevents accidentally falling in to service scrape mode when errors are encountered for other reasons. (#11174, @julz)

🐞 Bug Fixes

Uncategorized

  • Added schemas to all CRDs. (#11244, @markusthoemmes)
  • Changed the rollout behavior of application deployment changes (due to Knative upgrade for example) to never have less ready posd than required. (#11140, @markusthoemmes)
  • Rate limits digest resolution (10 QPS, retry back-off 1s to 1000s) to prevent exceeding quota at remote registries (#11279, @julz)
  • Revision replicas shut down 15s quicker. (#11249, @markusthoemmes)
  • The activator's proxy is now sensitive to the EnableMeshPodAddressability setting. (#11162, @markusthoemmes)
  • Update the User-Agent used during tag resolution (#10590, @jonjohnsonjr)

Dependencies

Added

  • github.com/ahmetb/gen-crd-api-reference-docs: c1402a7

Changed

  • contrib.go.opencensus.io/exporter/prometheus: 6bcf6f8 β†’ v0.3.0
  • github.com/containerd/stargz-snapshotter/estargz: a9a0c2d β†’ v0.4.1
  • github.com/envoyproxy/go-control-plane: fd9021f β†’ 668b12f
  • github.com/golang/protobuf: v1.4.3 β†’ v1.5.2
  • github.com/google/go-containerregistry/pkg/authn/k8schain: 5c4818d β†’ 9cf3ed4
  • github.com/google/go-containerregistry: 19c2b63 β†’ v0.5.0
  • github.com/prometheus/client_golang: v1.9.0 β†’ v1.10.0
  • github.com/prometheus/common: v0.19.0 β†’ v0.20.0
  • github.com/prometheus/procfs: v0.2.0 β†’ v0.6.0
  • github.com/prometheus/statsd_exporter: v0.15.0 β†’ v0.20.0
  • golang.org/x/crypto: eec23a3 β†’ 4f45737
  • golang.org/x/lint: 738671d β†’ 83fdc39
  • golang.org/x/net: 5f4716e β†’ e915ea6
  • golang.org/x/oauth2: f9ce19e β†’ 5e61552
  • golang.org/x/sync: 09787c9 β†’ 036812b
  • golang.org/x/sys: 22da62e β†’ 4fbd30e
  • golang.org/x/text: v0.3.5 β†’ v0.3.6
  • golang.org/x/time: 7e3f01d β†’ f8bda1e
  • google.golang.org/genproto: 8c77b98 β†’ 9910b6c
  • google.golang.org/grpc: v1.36.0 β†’ v1.37.0
  • google.golang.org/protobuf: v1.25.0 β†’ v1.26.0
  • knative.dev/caching: 5691bb3 β†’ 9227826
  • knative.dev/hack: b6ab329 β†’ 93ad912
  • knative.dev/networking: 999a770 β†’ ace2d33
  • knative.dev/pkg: 952fdd9 β†’ 4564797

Removed

Nothing has changed.

serving - Knative Serving release v0.26.0

Published by knative-prow-releaser-robot about 3 years ago

Changelog since 0.25

🚨 Breaking or Notable

  • Kubernetes 1.20 is now required

πŸ’« New Features & Changes

  • Allow users to set container[*].securityContext.runAsGroup (#12003, @dprotaso)

  • A new setting, mesh-compatibility-mode, in the networking config map allows an administrator
    to explicitly tell Activator and Autoscaler to use Direct Pod IP (most efficient, but not compatible
    with mesh being enabled), Cluster IP (less efficient, but needed if mesh is enabled), or to
    Autodetect (the current behaviour, and the default, causes Activator and Autoscaler to first attempt
    Direct Pod IP communication, and then fall back to Cluster IP if it sees a mesh-related error status
    code). (#11999, @julz)

🐞 Bug Fixes

Uncategorized

  • Adds more debug logs to background digest resolver (#11959, @julz)
  • Dropped the startup probe on the queue-proxy which makes the pods start ~500ms quicker on average. (#11965, @markusthoemmes)
  • Removes the ServiceName field from RevisionStatus which has been deprecated for several releases. This field was effectively equal to the revision name. (#11817, @julz)
  • User-supplied readinessProbes with a probePeriod set greater than zero are no longer silently ignored after pod startup. (#11190, @julz)
  • When enabled, queue proxy tracks the request count for each pod (disabled by default) (#11783, @psschwei)

Dependencies

  • github.com/moby/spdystream: v0.2.0
  • k8s.io/controller-manager: v0.21.0
  • contrib.go.opencensus.io/exporter/prometheus: v0.3.0 β†’ v0.4.0
  • github.com/NYTimes/gziphandler: 56545f4 β†’ v1.1.1
  • github.com/containerd/stargz-snapshotter/estargz: v0.6.4 β†’ v0.7.0
  • github.com/creack/pty: v1.1.9 β†’ v1.1.11
  • github.com/go-kit/kit: v0.10.0 β†’ v0.9.0
  • github.com/golang/groupcache: 8c9f03a β†’ 41bb18b
  • github.com/google/go-containerregistry/pkg/authn/k8schain: c086c7f β†’ ce35c99
  • github.com/google/go-containerregistry: b448aba β†’ v0.6.0
  • github.com/hashicorp/consul/api: v1.3.0 β†’ v1.1.0
  • github.com/hashicorp/consul/sdk: v0.3.0 β†’ v0.1.1
  • github.com/moby/term: 672ec06 β†’ df9cb8a
  • github.com/pierrec/lz4: v2.0.5+incompatible β†’ 473cd7c
  • github.com/prometheus/common: v0.26.0 β†’ v0.30.0
  • github.com/prometheus/statsd_exporter: v0.20.0 β†’ v0.21.0
  • github.com/streadway/amqp: edfb901 β†’ 75d898a
  • github.com/vdemeester/k8s-pkg-credentialprovider: v1.20.7 β†’ v1.21.0-1
  • go.uber.org/zap: v1.18.1 β†’ v1.19.0
  • golang.org/x/crypto: c07d793 β†’ 32db794
  • golang.org/x/net: c6fcb2d β†’ e898025
  • golang.org/x/oauth2: a41e5a7 β†’ 2bc19b1
  • golang.org/x/term: 2321bbc β†’ 6a3ed07
  • golang.org/x/time: 38a9dc6 β†’ 1f47c86
  • google.golang.org/grpc: v1.39.0 β†’ v1.40.0
  • gopkg.in/gcfg.v1: v1.2.3 β†’ v1.2.0
  • gopkg.in/warnings.v0: v0.1.2 β†’ v0.1.1
  • k8s.io/api: v0.20.7 β†’ v0.21.4
  • k8s.io/apiextensions-apiserver: v0.20.7 β†’ v0.21.4
  • k8s.io/apimachinery: v0.20.7 β†’ v0.21.4
  • k8s.io/apiserver: v0.20.7 β†’ v0.21.4
  • k8s.io/client-go: v0.20.7 β†’ v0.21.4
  • k8s.io/cloud-provider: v0.19.7 β†’ v0.21.0
  • k8s.io/code-generator: v0.20.7 β†’ v0.21.4
  • k8s.io/component-base: v0.20.7 β†’ v0.21.4
  • k8s.io/csi-translation-lib: v0.19.7 β†’ v0.21.0
  • k8s.io/klog/v2: v2.5.0 β†’ v2.8.0
  • k8s.io/kube-openapi: 8566a33 β†’ 591a79e
  • k8s.io/legacy-cloud-providers: v0.19.7 β†’ v0.21.0
  • knative.dev/caching: 4e553d2 β†’ 0184eb9
  • knative.dev/hack: e28525d β†’ 815cd31
  • knative.dev/networking: acdfd41 β†’ 69ad454
  • knative.dev/pkg: 21eb4c1 β†’ 5ae4821
  • sigs.k8s.io/apiserver-network-proxy/konnectivity-client: v0.0.15 β†’ v0.0.22
  • sigs.k8s.io/structured-merge-diff/v4: v4.0.3 β†’ v4.1.2
  • github.com/Knetic/govaluate: 9aa4983
  • github.com/VividCortex/gohistogram: v1.0.0
  • github.com/afex/hystrix-go: fa1af6a
  • github.com/apache/thrift: v0.13.0
  • github.com/aryann/difflib: e206f87
  • github.com/aws/aws-lambda-go: v1.13.3
  • github.com/aws/aws-sdk-go-v2: v0.18.0
  • github.com/casbin/casbin/v2: v2.1.2
  • github.com/cenkalti/backoff: v2.2.1+incompatible
  • github.com/clbanning/x2j: 8252494
  • github.com/codahale/hdrhistogram: 3a0bb77
  • github.com/edsrzf/mmap-go: v1.0.0
  • github.com/franela/goblin: c9ffbef
  • github.com/franela/goreq: bcd34c9
  • github.com/go-sql-driver/mysql: v1.4.0
  • github.com/hashicorp/go-version: v1.2.0
  • github.com/hudl/fargo: v1.3.0
  • github.com/influxdata/influxdb1-client: 8bf82d3
  • github.com/lightstep/lightstep-tracer-common/golang/gogo: bc2310a
  • github.com/lightstep/lightstep-tracer-go: v0.18.1
  • github.com/nats-io/jwt: v0.3.2
  • github.com/nats-io/nats-server/v2: v2.1.2
  • github.com/nats-io/nats.go: v1.9.1
  • github.com/nats-io/nkeys: v0.1.3
  • github.com/nats-io/nuid: v1.0.1
  • github.com/oklog/oklog: v0.3.2
  • github.com/oklog/run: v1.0.0
  • github.com/op/go-logging: 970db52
  • github.com/opentracing-contrib/go-observer: a52f234
  • github.com/opentracing/basictracer-go: v1.0.0
  • github.com/opentracing/opentracing-go: v1.1.0
  • github.com/openzipkin-contrib/zipkin-go-opentracing: v0.4.5
  • github.com/pact-foundation/pact-go: v1.0.4
  • github.com/pborman/uuid: v1.2.0
  • github.com/performancecopilot/speed: v3.0.0+incompatible
  • github.com/samuel/go-zookeeper: 2cc03de
  • github.com/sony/gobreaker: v0.4.1
  • github.com/streadway/handy: d5acb31
  • go.uber.org/tools: 2cfd321
  • sourcegraph.com/sourcegraph/appdash: ebfcffb
serving - Knative Serving release v0.23.2

Published by knative-prow-releaser-robot about 3 years ago

🚨 Breaking or Notable

  • Change the default post-install job to use sslip.io rather than xip.io. (#11298, @julz)

πŸ’« New Features & Changes

  • The stats scraping in the autoscaler is now sensitive to the EnableMeshPodAddressability setting. A restart of the autoscaler is required for the setting to take effect if changed. (#11161, @markusthoemmes)
  • The state keeping in the activator is now sensitive to the EnableMeshPodAddressability setting. A restart of the activator is required for the setting to take effect if changed. (#11172, @markusthoemmes)
  • Tightens the heuristic for mesh being abled in the service scraper. We now expect all errors to be related to mesh (i.e. 503 status code). This prevents accidentally falling in to service scrape mode when errors are encountered for other reasons. (#11174, @julz)

🐞 Bug Fixes

Uncategorized

  • Added schemas to all CRDs. (#11244, @markusthoemmes)
  • Changed the rollout behavior of application deployment changes (due to Knative upgrade for example) to never have less ready posd than required. (#11140, @markusthoemmes)
  • Rate limits digest resolution (10 QPS, retry back-off 1s to 1000s) to prevent exceeding quota at remote registries (#11279, @julz)
  • Revision replicas shut down 15s quicker. (#11249, @markusthoemmes)
  • The activator's proxy is now sensitive to the EnableMeshPodAddressability setting. (#11162, @markusthoemmes)
  • Update the User-Agent used during tag resolution (#10590, @jonjohnsonjr)

Dependencies

Added

  • github.com/ahmetb/gen-crd-api-reference-docs: c1402a7

Changed

  • contrib.go.opencensus.io/exporter/prometheus: 6bcf6f8 β†’ v0.3.0
  • github.com/containerd/stargz-snapshotter/estargz: a9a0c2d β†’ v0.4.1
  • github.com/envoyproxy/go-control-plane: fd9021f β†’ 668b12f
  • github.com/golang/protobuf: v1.4.3 β†’ v1.5.2
  • github.com/google/go-containerregistry/pkg/authn/k8schain: 5c4818d β†’ 9cf3ed4
  • github.com/google/go-containerregistry: 19c2b63 β†’ v0.5.0
  • github.com/prometheus/client_golang: v1.9.0 β†’ v1.10.0
  • github.com/prometheus/common: v0.19.0 β†’ v0.20.0
  • github.com/prometheus/procfs: v0.2.0 β†’ v0.6.0
  • github.com/prometheus/statsd_exporter: v0.15.0 β†’ v0.20.0
  • golang.org/x/crypto: eec23a3 β†’ 4f45737
  • golang.org/x/lint: 738671d β†’ 83fdc39
  • golang.org/x/net: 5f4716e β†’ e915ea6
  • golang.org/x/oauth2: f9ce19e β†’ 5e61552
  • golang.org/x/sync: 09787c9 β†’ 036812b
  • golang.org/x/sys: 22da62e β†’ 4fbd30e
  • golang.org/x/text: v0.3.5 β†’ v0.3.6
  • golang.org/x/time: 7e3f01d β†’ f8bda1e
  • google.golang.org/genproto: 8c77b98 β†’ 9910b6c
  • google.golang.org/grpc: v1.36.0 β†’ v1.37.0
  • google.golang.org/protobuf: v1.25.0 β†’ v1.26.0
  • knative.dev/caching: 5691bb3 β†’ 9227826
  • knative.dev/hack: b6ab329 β†’ 93ad912
  • knative.dev/networking: 999a770 β†’ ace2d33
  • knative.dev/pkg: 952fdd9 β†’ 4564797

Removed

Nothing has changed.

serving - Knative Serving release v0.24.1

Published by knative-prow-releaser-robot about 3 years ago

Changes by Kind

🚨 Breaking or Notable

1. Renaming of some net-* components

Related issue: knative/networking#448

As part of our efforts to GA/1.0 we've standardized on the naming of our networking plugins that are installed along side Serving. If you're managing your Knative deployment manually with kubectl this will require a two-phase upgrade process. Please see the below sections:

Upgrade of net-http01 to v0.24.0
# Apply the new release
$ kubectl apply -f net-http01.yaml

# Once the deployment is ready delete the old resources
$ kubectl delete deployment http01-controller -n knative-serving
$ kubectl delete service challenger -n knative-serving
Upgrade of net-certmanager to v0.24.0
# Apply the new release
$ kubectl apply -f net-certmanager.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-certmanager.yaml \
  --prune -l networking.knative.dev/certificate-provider=cert-manager
Upgrade net-istio to v0.24.0
# Apply the new release
$ kubectl apply -f net-istio.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-istio.yaml \
  --prune -l networking.knative.dev/ingress-provider=istio
Upgrade of net-contour to v0.24.0
# Apply the new release
$ kubectl apply -f net-contour.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-contour.yaml -f contour.yaml \
  --prune -l networking.knative.dev/ingress-provider=contour
Upgrade of namespace certificate controller to v0.24.0
# Apply the new release
$ kubectl apply -f serving-nscert.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f serving-nscert.yaml \
  --prune -l networking.knative.dev/wildcard-certificate-provider=nscert
Upgrade of net-kourier to v0.24.0

At this point we've defered the renaming to net-kourier until the next release. We're looking to ensure there is no traffic disruption as part of the upgrade. Thus upgrading to v0.24.0 requires no special instructions.

2. Kubernetes 1.19 is now required

As part of our Kubernetes Minimum Version Principle we now have a hard requirement on Kubernetes Version 1.19.

3. Webhook/Controller RBAC changes

The recommended way to delete a Knative installation is to run kubectl delete -f serving-core.yaml and other release YAMLs you may have applied. There's been a misconception that deleting the knative-serving namespace will perform a similar cleanup but this does not remove cluster scoped resources. In prior releases the cluster state would have prevented the reinstall of Knative Serving. We've addressed this problem but it will require some RBAC permissions on namespaces & finalizers.

Please see the relevant issues & PRs:

4. DomainMapping feature is now BETA

This means it is built in to the main serving-core yaml by default. It is still possible to opt out of the feature by setting replica count of the domainmapping-controller to zero.

As part of this transition the default value for autocreateClusterDomainClaims in the config-network config map has been changed to false meaning cluster-wide permissions are required to delegate the ability to create particular DomainMappings to namespaces.Single tenant clusters may wish to allow arbitrary users to create Domain Mappings by changing this value back to true. (#11573, @julz)

πŸ’« New Features & Changes

  • Allow dropping capabilities from a container's security context (#11344, @psschwei)
  • Domainmapping can now specify a tls secret to be used as the https certificate (#11250, @shinigambit)
  • Provides a feature gate that, when enabled, allows adding capabilities from a container's security context (#11410, @psschwei)
  • defaultExternalScheme can now be used to default routes to surface a URL scheme of your choice rather than the default "http". (#11480, @markusthoemmes)
  • Optimized generated routes to minimize Envoy configuration size (net-istio#632, @howardjohn)
  • Rename Contonr's ClusterRole and ClusterRoleBinding to differ from existing contour installation (net-contour#500, @izabelacg)
  • Add a new ConfigMap config-kourier, with the initial enable-service-access-logging setting (net-kourier#523, @markusthoemmes)

🐞 Bug Fixes

  • Fixed a bug where traffic would briefly be routed 'wrong', leading to errors due to exceeded queues in deployments with a large activator count and a low service pod count. (#11375, @markusthoemmes)
  • Traffic status in Route is updated whenever traffic configuration was wrong. (#11477, @nak3)
  • Validates, consistently with other configmaps, that the _example section of the features configmap is not accidentally modified. (#11391, @julz)

Dependencies Changes

  • bazil.org/fuse: 371fbbd
  • cloud.google.com/go/firestore: v1.1.0
  • github.com/Microsoft/hcsshim/test: 43a75bb
  • github.com/Microsoft/hcsshim: v0.8.16
  • github.com/Shopify/logrus-bugsnag: 577dee2
  • github.com/alexflint/go-filemutex: 72bdc8e
  • github.com/bitly/go-simplejson: v0.5.0
  • github.com/bketelsen/crypt: 5cbc8cc
  • github.com/bmizerany/assert: b7ed37b
  • github.com/bshuster-repo/logrus-logstash-hook: v0.4.1
  • github.com/buger/jsonparser: f4dd9f5
  • github.com/bugsnag/bugsnag-go: b1d1530
  • github.com/bugsnag/osext: 0dd3f91
  • github.com/bugsnag/panicwrap: e2c2850
  • github.com/checkpoint-restore/go-criu/v4: v4.1.0
  • github.com/cilium/ebpf: v0.4.0
  • github.com/containerd/aufs: v1.0.0
  • github.com/containerd/btrfs: v1.0.0
  • github.com/containerd/cgroups: v1.0.1
  • github.com/containerd/console: v1.0.2
  • github.com/containerd/continuity: v0.1.0
  • github.com/containerd/fifo: v1.0.0
  • github.com/containerd/go-cni: v1.0.2
  • github.com/containerd/go-runc: v1.0.0
  • github.com/containerd/imgcrypt: v1.1.1
  • github.com/containerd/nri: v0.1.0
  • github.com/containerd/ttrpc: v1.0.2
  • github.com/containerd/typeurl: v1.0.2
  • github.com/containerd/zfs: v1.0.0
  • github.com/containernetworking/cni: v0.8.1
  • github.com/containernetworking/plugins: v0.9.1
  • github.com/containers/ocicrypt: v1.1.1
  • github.com/coreos/go-iptables: v0.5.0
  • github.com/coreos/go-systemd/v22: v22.1.0
  • github.com/cyphar/filepath-securejoin: v0.2.2
  • github.com/d2g/dhcp4: a1d1b6c
  • github.com/d2g/dhcp4client: v1.0.0
  • github.com/d2g/dhcp4server: 7d4a0a7
  • github.com/d2g/hardwareaddr: e7d9fbe
  • github.com/denverdino/aliyungo: a747050
  • github.com/docker/go-events: e31b211
  • github.com/docker/go-metrics: v0.0.1
  • github.com/docker/libtrust: fa56704
  • github.com/evanphx/json-patch/v5: v5.5.0
  • github.com/frankban/quicktest: v1.11.3
  • github.com/fullsailor/pkcs7: d7302db
  • github.com/garyburd/redigo: 535138d
  • github.com/go-ini/ini: v1.25.4
  • github.com/go-kit/log: v0.1.0
  • github.com/godbus/dbus/v5: v5.0.3
  • github.com/godbus/dbus: ade71ed
  • github.com/gorilla/handlers: 60c7bfd
  • github.com/j-keck/arping: 2cf9dc6
  • github.com/jessevdk/go-flags: v1.4.0
  • github.com/klauspost/compress: v1.13.0
  • github.com/marstr/guid: v1.1.0
  • github.com/mattn/go-shellwords: v1.0.3
  • github.com/miekg/pkcs11: v1.0.3
  • github.com/mistifyio/go-zfs: f784269
  • github.com/mitchellh/osext: 5e2d6d4
  • github.com/moby/locker: v1.0.1
  • github.com/moby/sys/mountinfo: v0.4.1
  • github.com/moby/sys/symlink: v0.1.0
  • github.com/mrunalp/fileutils: v0.5.0
  • github.com/ncw/swift: v1.0.47
  • github.com/opencontainers/runc: v1.0.0-rc93
  • github.com/opencontainers/runtime-spec: e6143ca
  • github.com/opencontainers/runtime-tools: 1d69bd0
  • github.com/opencontainers/selinux: v1.8.0
  • github.com/safchain/ethtool: 42ed695
  • github.com/seccomp/libseccomp-golang: v0.9.1
  • github.com/stefanberger/go-pkcs11uri: 78d3cae
  • github.com/subosito/gotenv: v1.2.0
  • github.com/syndtr/gocapability: 42c35b4
  • github.com/tchap/go-patricia: v2.2.6+incompatible
  • github.com/vishvananda/netlink: d40f988
  • github.com/vishvananda/netns: db3c7e5
  • github.com/willf/bitset: v1.1.11
  • github.com/xeipuuv/gojsonpointer: 4e3ac27
  • github.com/xeipuuv/gojsonreference: bd5ef7b
  • github.com/xeipuuv/gojsonschema: 1d52303
  • github.com/yvasiyarov/go-metrics: 57bccd1
  • github.com/yvasiyarov/gorelic: a9bba5b
  • github.com/yvasiyarov/newrelic_platform_go: b21fdbd
  • go.mozilla.org/pkcs7: 432b235
  • google.golang.org/cloud: 975617b
  • google.golang.org/grpc/cmd/protoc-gen-go-grpc: v1.1.0
  • gopkg.in/airbrake/gobrake.v2: v2.0.9
  • gopkg.in/gemnasium/logrus-airbrake-hook.v2: v2.1.2
  • gopkg.in/ini.v1: v1.51.0
  • k8s.io/cri-api: v0.20.6
  • k8s.io/kubernetes: v1.13.0
  • github.com/agnivade/levenshtein: v1.0.1
  • github.com/andreyvit/diff: c7f18ee
  • github.com/globalsign/mgo: eeefdec
  • github.com/go-openapi/analysis: v0.19.5
  • github.com/go-openapi/errors: v0.19.2
  • github.com/go-openapi/loads: v0.19.4
  • github.com/go-openapi/runtime: v0.19.4
  • github.com/go-openapi/strfmt: v0.19.3
  • github.com/go-openapi/validate: v0.19.5
  • github.com/joefitzgerald/rainbow-reporter: v0.1.0
  • github.com/maxbrunsfeld/counterfeiter/v6: v6.2.2
  • github.com/sclevine/spec: v1.2.0
  • github.com/tidwall/pretty: v1.0.0
  • github.com/vektah/gqlparser: v1.1.2
  • go.mongodb.org/mongo-driver: v1.1.2
  • gopkg.in/evanphx/json-patch.v4: v4.9.0
serving - Knative Serving release v0.25.1

Published by knative-prow-releaser-robot about 3 years ago

🚨 Breaking or Notable

1. Fixes for K8s 1.22

Related issue: https://github.com/knative/serving/issues/11448

Our webhook parser no longer rejects unknown fields in an object's metadata. New fields were introduced in K8s 1.22 which caused Knative's webhook to reject certain operations.

2. Renaming of some net-kourier components

Related issue: knative/networking#448

As part of our efforts to GA/1.0 we've standardized on the naming of our networking plugins that are installed along side Serving. If you're managing your Knative deployment manually with kubectl this will require a two-phase upgrade process. In order to upgrade net-kourier to v0.25.0 using kubectl please follow the steps:

# Apply the new release
$ kubectl apply -f net-kourier.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-kourier.yaml \
  --prune -l networking.knative.dev/ingress-provider=kourier

3. Disabling namespace certificate provisioning legacy label

The namespace label networking.internal.knative.dev/disableWildcardCert has been deprecated since v0.15.0 release in favour of networking.knative.dev/disableWildcardCert. We have dropped support for this legacy label. (#11626, @nak3)

πŸ’« New Features & Changes

  • A feature flag is available to enable priorityClassName for Knative Services. See config-features for details. (#11746, @nealhu)
  • Add memory metrics for HPA: hpa.autoscaling.knative.dev (#11668, @zhaojizhuang)
  • Added app.kubernetes.io/name labels to resources. It will be replacing app labels in the future. (#11655, @upodroid)
  • Containers[*].securityContext.runAsNonRoot can be set to true without a feature flag (#11606, @senthilnathan)
  • Users can set spec.template.spec.automountServiceAccountToken to false in a PodSpec in order to opt-out of Kubenetes' default behaviour of mounting a ServiceAccount token in that Pod's containers. (#11723, @psschwei)
  • Add v1beta1 version of DomainMapping crd (#11682, @julz)

🐞 Bug Fixes

  • Set ENABLE_HTTP2_AUTO_DETECTION to false by default if the feature is not enabled. (#11760, @psschwei)

Dependencies

  • github.com/benbjohnson/clock: v1.1.0
  • github.com/cncf/xds/go: fbca930
  • github.com/kr/fs: v0.1.0
  • github.com/pkg/sftp: v1.10.1
  • go.etcd.io/etcd/api/v3: v3.5.0
  • go.etcd.io/etcd/client/pkg/v3: v3.5.0
  • go.etcd.io/etcd/client/v2: v2.305.0
  • go.opentelemetry.io/proto/otlp: v0.7.0
  • contrib.go.opencensus.io/exporter/stackdriver: v0.13.5
  • github.com/remyoudompheng/bigfft: 52369c6
  • modernc.org/cc: v1.0.0
  • modernc.org/golex: v1.0.0
  • modernc.org/mathutil: v1.0.0
  • modernc.org/strutil: v1.0.0
  • modernc.org/xc: v1.0.0
serving - Knative Serving release v0.22.3

Published by knative-prow-releaser-robot about 3 years ago

🚨 Breaking or Notable

1. Fixes for K8s 1.22

Related issue: https://github.com/knative/serving/issues/11448

Our webhook parser no longer rejects unknown fields in an object's metadata. New fields were introduced in K8s 1.22 which caused Knative's webhook to reject certain operations.

πŸ’« New Features & Changes

  • Added an autoscaling annotation to choose a different aggregation algorithm for the autoscaling metrics. This is experimental currently. (#10840, @vagababov)
  • Added autocreateClusterDomainClaims flag to network config map. (networking#330, @julz)

🐞 Bug Fixes

  • Adds validation that a default max-scale is set if a max-scale-limit is specified in the autoscaler configmap (since otherwise the default max-scale, i.e. 0 = no max, would fail validation as it is above the max-scale-limit). (#10921, @julz)
  • Bumped the resource request and limits of the autoscaler to 100m/100Mi, 1000m/1000Mi respectively. (#10865, @markusthoemmes)
  • Fixed a regression where the pod bringup time might have a latency of 10s or more even though the container should be up quickly. (#10992, @markusthoemmes)
  • Reduced the necessary memory allocations in the activator significantly, especially with disabled tracing. (#11016, #11013, #11009, #11008, @markusthoemmes)
  • Fix the incorrect Gateway name format for DomainMapping auto TLS feature for net-istio implmenetation. (net-istio#532, @ZhiminXiang)

Dependencies

Added

Nothing has changed.

Changed

  • github.com/google/go-cmp: v0.5.4 β†’ v0.5.5
  • github.com/prometheus/common: v0.15.0 β†’ v0.19.0
  • go.opencensus.io: v0.22.6 β†’ v0.23.0
  • google.golang.org/grpc: v1.35.0 β†’ v1.36.0
  • knative.dev/caching: 1212288 β†’ 5691bb3
  • knative.dev/hack: 8368e1f β†’ b6ab329
  • knative.dev/networking: 088986a β†’ 999a770
  • knative.dev/pkg: 84c98f3 β†’ 952fdd9

Removed

Nothing has changed.

serving - Knative Serving release v0.25.0

Published by knative-prow-releaser-robot about 3 years ago

🚨 Breaking or Notable

1. Renaming of some net-kourier components

Related issue: knative/networking#448

As part of our efforts to GA/1.0 we've standardized on the naming of our networking plugins that are installed along side Serving. If you're managing your Knative deployment manually with kubectl this will require a two-phase upgrade process. In order to upgrade net-kourier to v0.25.0 using kubectl please follow the steps:

# Apply the new release
$ kubectl apply -f net-kourier.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-kourier.yaml \
  --prune -l networking.knative.dev/ingress-provider=kourier

2. Disabling namespace certificate provisioning legacy label

The namespace label networking.internal.knative.dev/disableWildcardCert has been deprecated since v0.15.0 release in favour of networking.knative.dev/disableWildcardCert. We have dropped support for this legacy label. (#11626, @nak3)

πŸ’« New Features & Changes

  • A feature flag is available to enable priorityClassName for Knative Services. See config-features for details. (#11746, @nealhu)
  • Add memory metrics for HPA: hpa.autoscaling.knative.dev (#11668, @zhaojizhuang)
  • Added app.kubernetes.io/name labels to resources. It will be replacing app labels in the future. (#11655, @upodroid)
  • Containers[*].securityContext.runAsNonRoot can be set to true without a feature flag (#11606, @senthilnathan)
  • Users can set spec.template.spec.automountServiceAccountToken to false in a PodSpec in order to opt-out of Kubenetes' default behaviour of mounting a ServiceAccount token in that Pod's containers. (#11723, @psschwei)
  • Add v1beta1 version of DomainMapping crd (#11682, @julz)

🐞 Bug Fixes

  • Set ENABLE_HTTP2_AUTO_DETECTION to false by default if the feature is not enabled. (#11760, @psschwei)

Dependencies

  • github.com/benbjohnson/clock: v1.1.0
  • github.com/cncf/xds/go: fbca930
  • github.com/kr/fs: v0.1.0
  • github.com/pkg/sftp: v1.10.1
  • go.etcd.io/etcd/api/v3: v3.5.0
  • go.etcd.io/etcd/client/pkg/v3: v3.5.0
  • go.etcd.io/etcd/client/v2: v2.305.0
  • go.opentelemetry.io/proto/otlp: v0.7.0
  • contrib.go.opencensus.io/exporter/stackdriver: v0.13.5
  • github.com/remyoudompheng/bigfft: 52369c6
  • modernc.org/cc: v1.0.0
  • modernc.org/golex: v1.0.0
  • modernc.org/mathutil: v1.0.0
  • modernc.org/strutil: v1.0.0
  • modernc.org/xc: v1.0.0
serving - Knative Serving v0.24.0

Published by knative-prow-releaser-robot over 3 years ago

Changes by Kind

🚨 Breaking or Notable

1. Renaming of some net-* components

Related issue: knative/networking#448

As part of our efforts to GA/1.0 we've standardized on the naming of our networking plugins that are installed along side Serving. If you're managing your Knative deployment manually with kubectl this will require a two-phase upgrade process. Please see the below sections:

Upgrade of net-http01 to v0.24.0
# Apply the new release
$ kubectl apply -f net-http01.yaml

# Once the deployment is ready delete the old resources
$ kubectl delete deployment http01-controller -n knative-serving
$ kubectl delete service challenger -n knative-serving
Upgrade of net-certmanager to v0.24.0
# Apply the new release
$ kubectl apply -f net-certmanager.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-certmanager.yaml \
  --prune -l networking.knative.dev/certificate-provider=cert-manager
Upgrade net-istio to v0.24.0
# Apply the new release
$ kubectl apply -f net-istio.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-istio.yaml \
  --prune -l networking.knative.dev/ingress-provider=istio
Upgrade of net-contour to v0.24.0
# Apply the new release
$ kubectl apply -f net-contour.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f net-contour.yaml \
  --prune -l networking.knative.dev/ingress-provider=contour
Upgrade of net-kourier to v0.24.0

At this point we've defered the renaming to net-kourier until the next release. We're looking to ensure there is no traffic disruption as part of the upgrade. Thus upgrading to v0.24.0 requires no special instructions.

Upgrade of namespace certificate controller to v0.24.0
# Apply the new release
$ kubectl apply -f serving-nscert.yaml

# Once the deployment is ready apply the same file but 
# prune the old resources
$ kubectl apply -f serving-nscert.yaml \
  --prune -l networking.knative.dev/wildcard-certificate-provider=nscert

2. Kubernetes 1.19 is now required

As part of our Kubernetes Minimum Version Principle we now have a hard requirement on Kubernetes Version 1.19.

3. Webhook/Controller RBAC changes

The recommended way to delete a Knative installation is to run kubectl delete -f serving-core.yaml and other release YAMLs you may have applied. There's been a misconception that deleting the knative-serving namespace will perform a similar cleanup but this does not remove cluster scoped resources. In prior releases the cluster state would have prevented the reinstall of Knative Serving. We've addressed this problem but it will require some RBAC permissions on namespaces & finalizers.

Please see the relevant issues & PRs:

4. DomainMapping feature is now BETA

This means it is built in to the main serving-core yaml by default. It is still possible to opt out of the feature by setting replica count of the domainmapping-controller to zero.

As part of this transition the default value for autocreateClusterDomainClaims in the config-network config map has been changed to false meaning cluster-wide permissions are required to delegate the ability to create particular DomainMappings to namespaces.Single tenant clusters may wish to allow arbitrary users to create Domain Mappings by changing this value back to true. (#11573, @julz)

πŸ’« New Features & Changes

  • Allow dropping capabilities from a container's security context (#11344, @psschwei)
  • Domainmapping can now specify a tls secret to be used as the https certificate (#11250, @shinigambit)
  • Provides a feature gate that, when enabled, allows adding capabilities from a container's security context (#11410, @psschwei)
  • defaultExternalScheme can now be used to default routes to surface a URL scheme of your choice rather than the default "http". (#11480, @markusthoemmes)
  • Optimized generated routes to minimize Envoy configuration size (net-istio#632, @howardjohn)
  • Rename Contonr's ClusterRole and ClusterRoleBinding to differ from existing contour installation (net-contour#500, @izabelacg)
  • Add a new ConfigMap config-kourier, with the initial enable-service-access-logging setting (net-kourier#523, @markusthoemmes)

🐞 Bug Fixes

  • Fixed a bug where traffic would briefly be routed 'wrong', leading to errors due to exceeded queues in deployments with a large activator count and a low service pod count. (#11375, @markusthoemmes)
  • Traffic status in Route is updated whenever traffic configuration was wrong. (#11477, @nak3)
  • Validates, consistently with other configmaps, that the _example section of the features configmap is not accidentally modified. (#11391, @julz)

Dependencies Changes

  • bazil.org/fuse: 371fbbd
  • cloud.google.com/go/firestore: v1.1.0
  • github.com/Microsoft/hcsshim/test: 43a75bb
  • github.com/Microsoft/hcsshim: v0.8.16
  • github.com/Shopify/logrus-bugsnag: 577dee2
  • github.com/alexflint/go-filemutex: 72bdc8e
  • github.com/bitly/go-simplejson: v0.5.0
  • github.com/bketelsen/crypt: 5cbc8cc
  • github.com/bmizerany/assert: b7ed37b
  • github.com/bshuster-repo/logrus-logstash-hook: v0.4.1
  • github.com/buger/jsonparser: f4dd9f5
  • github.com/bugsnag/bugsnag-go: b1d1530
  • github.com/bugsnag/osext: 0dd3f91
  • github.com/bugsnag/panicwrap: e2c2850
  • github.com/checkpoint-restore/go-criu/v4: v4.1.0
  • github.com/cilium/ebpf: v0.4.0
  • github.com/containerd/aufs: v1.0.0
  • github.com/containerd/btrfs: v1.0.0
  • github.com/containerd/cgroups: v1.0.1
  • github.com/containerd/console: v1.0.2
  • github.com/containerd/continuity: v0.1.0
  • github.com/containerd/fifo: v1.0.0
  • github.com/containerd/go-cni: v1.0.2
  • github.com/containerd/go-runc: v1.0.0
  • github.com/containerd/imgcrypt: v1.1.1
  • github.com/containerd/nri: v0.1.0
  • github.com/containerd/ttrpc: v1.0.2
  • github.com/containerd/typeurl: v1.0.2
  • github.com/containerd/zfs: v1.0.0
  • github.com/containernetworking/cni: v0.8.1
  • github.com/containernetworking/plugins: v0.9.1
  • github.com/containers/ocicrypt: v1.1.1
  • github.com/coreos/go-iptables: v0.5.0
  • github.com/coreos/go-systemd/v22: v22.1.0
  • github.com/cyphar/filepath-securejoin: v0.2.2
  • github.com/d2g/dhcp4: a1d1b6c
  • github.com/d2g/dhcp4client: v1.0.0
  • github.com/d2g/dhcp4server: 7d4a0a7
  • github.com/d2g/hardwareaddr: e7d9fbe
  • github.com/denverdino/aliyungo: a747050
  • github.com/docker/go-events: e31b211
  • github.com/docker/go-metrics: v0.0.1
  • github.com/docker/libtrust: fa56704
  • github.com/evanphx/json-patch/v5: v5.5.0
  • github.com/frankban/quicktest: v1.11.3
  • github.com/fullsailor/pkcs7: d7302db
  • github.com/garyburd/redigo: 535138d
  • github.com/go-ini/ini: v1.25.4
  • github.com/go-kit/log: v0.1.0
  • github.com/godbus/dbus/v5: v5.0.3
  • github.com/godbus/dbus: ade71ed
  • github.com/gorilla/handlers: 60c7bfd
  • github.com/j-keck/arping: 2cf9dc6
  • github.com/jessevdk/go-flags: v1.4.0
  • github.com/klauspost/compress: v1.13.0
  • github.com/marstr/guid: v1.1.0
  • github.com/mattn/go-shellwords: v1.0.3
  • github.com/miekg/pkcs11: v1.0.3
  • github.com/mistifyio/go-zfs: f784269
  • github.com/mitchellh/osext: 5e2d6d4
  • github.com/moby/locker: v1.0.1
  • github.com/moby/sys/mountinfo: v0.4.1
  • github.com/moby/sys/symlink: v0.1.0
  • github.com/mrunalp/fileutils: v0.5.0
  • github.com/ncw/swift: v1.0.47
  • github.com/opencontainers/runc: v1.0.0-rc93
  • github.com/opencontainers/runtime-spec: e6143ca
  • github.com/opencontainers/runtime-tools: 1d69bd0
  • github.com/opencontainers/selinux: v1.8.0
  • github.com/safchain/ethtool: 42ed695
  • github.com/seccomp/libseccomp-golang: v0.9.1
  • github.com/stefanberger/go-pkcs11uri: 78d3cae
  • github.com/subosito/gotenv: v1.2.0
  • github.com/syndtr/gocapability: 42c35b4
  • github.com/tchap/go-patricia: v2.2.6+incompatible
  • github.com/vishvananda/netlink: d40f988
  • github.com/vishvananda/netns: db3c7e5
  • github.com/willf/bitset: v1.1.11
  • github.com/xeipuuv/gojsonpointer: 4e3ac27
  • github.com/xeipuuv/gojsonreference: bd5ef7b
  • github.com/xeipuuv/gojsonschema: 1d52303
  • github.com/yvasiyarov/go-metrics: 57bccd1
  • github.com/yvasiyarov/gorelic: a9bba5b
  • github.com/yvasiyarov/newrelic_platform_go: b21fdbd
  • go.mozilla.org/pkcs7: 432b235
  • google.golang.org/cloud: 975617b
  • google.golang.org/grpc/cmd/protoc-gen-go-grpc: v1.1.0
  • gopkg.in/airbrake/gobrake.v2: v2.0.9
  • gopkg.in/gemnasium/logrus-airbrake-hook.v2: v2.1.2
  • gopkg.in/ini.v1: v1.51.0
  • k8s.io/cri-api: v0.20.6
  • k8s.io/kubernetes: v1.13.0
  • github.com/agnivade/levenshtein: v1.0.1
  • github.com/andreyvit/diff: c7f18ee
  • github.com/globalsign/mgo: eeefdec
  • github.com/go-openapi/analysis: v0.19.5
  • github.com/go-openapi/errors: v0.19.2
  • github.com/go-openapi/loads: v0.19.4
  • github.com/go-openapi/runtime: v0.19.4
  • github.com/go-openapi/strfmt: v0.19.3
  • github.com/go-openapi/validate: v0.19.5
  • github.com/joefitzgerald/rainbow-reporter: v0.1.0
  • github.com/maxbrunsfeld/counterfeiter/v6: v6.2.2
  • github.com/sclevine/spec: v1.2.0
  • github.com/tidwall/pretty: v1.0.0
  • github.com/vektah/gqlparser: v1.1.2
  • go.mongodb.org/mongo-driver: v1.1.2
  • gopkg.in/evanphx/json-patch.v4: v4.9.0
serving - Knative Serving release v0.23.1

Published by knative-prow-releaser-robot over 3 years ago

🚨 Breaking or Notable

  • Change the default post-install job to use sslip.io rather than xip.io. (#11298, @julz)

πŸ’« New Features & Changes

  • The stats scraping in the autoscaler is now sensitive to the EnableMeshPodAddressability setting. A restart of the autoscaler is required for the setting to take effect if changed. (#11161, @markusthoemmes)
  • The state keeping in the activator is now sensitive to the EnableMeshPodAddressability setting. A restart of the activator is required for the setting to take effect if changed. (#11172, @markusthoemmes)
  • Tightens the heuristic for mesh being abled in the service scraper. We now expect all errors to be related to mesh (i.e. 503 status code). This prevents accidentally falling in to service scrape mode when errors are encountered for other reasons. (#11174, @julz)

🐞 Bug Fixes

Uncategorized

  • Added schemas to all CRDs. (#11244, @markusthoemmes)
  • Changed the rollout behavior of application deployment changes (due to Knative upgrade for example) to never have less ready posd than required. (#11140, @markusthoemmes)
  • Rate limits digest resolution (10 QPS, retry back-off 1s to 1000s) to prevent exceeding quota at remote registries (#11279, @julz)
  • Revision replicas shut down 15s quicker. (#11249, @markusthoemmes)
  • The activator's proxy is now sensitive to the EnableMeshPodAddressability setting. (#11162, @markusthoemmes)
  • Update the User-Agent used during tag resolution (#10590, @jonjohnsonjr)

Dependencies

Added

  • github.com/ahmetb/gen-crd-api-reference-docs: c1402a7

Changed

  • contrib.go.opencensus.io/exporter/prometheus: 6bcf6f8 β†’ v0.3.0
  • github.com/containerd/stargz-snapshotter/estargz: a9a0c2d β†’ v0.4.1
  • github.com/envoyproxy/go-control-plane: fd9021f β†’ 668b12f
  • github.com/golang/protobuf: v1.4.3 β†’ v1.5.2
  • github.com/google/go-containerregistry/pkg/authn/k8schain: 5c4818d β†’ 9cf3ed4
  • github.com/google/go-containerregistry: 19c2b63 β†’ v0.5.0
  • github.com/prometheus/client_golang: v1.9.0 β†’ v1.10.0
  • github.com/prometheus/common: v0.19.0 β†’ v0.20.0
  • github.com/prometheus/procfs: v0.2.0 β†’ v0.6.0
  • github.com/prometheus/statsd_exporter: v0.15.0 β†’ v0.20.0
  • golang.org/x/crypto: eec23a3 β†’ 4f45737
  • golang.org/x/lint: 738671d β†’ 83fdc39
  • golang.org/x/net: 5f4716e β†’ e915ea6
  • golang.org/x/oauth2: f9ce19e β†’ 5e61552
  • golang.org/x/sync: 09787c9 β†’ 036812b
  • golang.org/x/sys: 22da62e β†’ 4fbd30e
  • golang.org/x/text: v0.3.5 β†’ v0.3.6
  • golang.org/x/time: 7e3f01d β†’ f8bda1e
  • google.golang.org/genproto: 8c77b98 β†’ 9910b6c
  • google.golang.org/grpc: v1.36.0 β†’ v1.37.0
  • google.golang.org/protobuf: v1.25.0 β†’ v1.26.0
  • knative.dev/caching: 5691bb3 β†’ 9227826
  • knative.dev/hack: b6ab329 β†’ 93ad912
  • knative.dev/networking: 999a770 β†’ ace2d33
  • knative.dev/pkg: 952fdd9 β†’ 4564797

Removed

Nothing has changed.

serving - Knative Serving release v0.20.2

Published by knative-prow-releaser-robot over 3 years ago

🚨 Breaking

  • Validate DomainMapping name if it is fully qualified. (#10379, @nak3)
  • Remove the GC feature flag and v1 GC/Labeler (#10084, @whaught)
  • Removes webhook name from code and set webhook name in webhook deployment yaml using key WEBHOOK_NAME (#10205, @arghya88)

πŸ’« New Features & Changes

  • A feature flag is now available to enable hostAliases for Knative Services. See config-features for details. (#10301, @emaildanwilson)
  • Add AutoTLS support for DomainMapping (#10467, @tcnghia)
  • DomainMappings now support arbitrary target references, rather than only Knative Services. The target must conform to the Addressable contract (including Kubernetes Services), and the resolved URI must be of the form {name}.{namespace}.svc.{cluster-suffix}. (#10210, @julz)
  • Introduce serving.knative.dev/domainmapping label for Ingress generated by DomainMapping. (#10370, @nak3)
  • Leader election transition improvements (#10131, @dprotaso)
  • Profiling port is now configurable via the env var PROFILING_PORT (knative/pkg#1950, @mattmoor)
  • Gradual traffic rollout of the configuration targets is now available in Knative. Right now it is driven by the rolloutDuration entry in the config-network configmap. When positive this setting will move the traffic gradually from the previous to the current revision over this period of time. It can handle several rollouts at the same time in three dimensions:
    • different tags can be rolled out independently if they are pointing at different configs
    • diferent percentages for the same configuration target will roll out at different speeds (but will finish around the same deadline)
    • if new revisions were created while previous rollouts have not yet finished, the system will drain them and move everything to the newest revision.

🐞 Bug Fixes

  • Changes how ClusterDomainClaims are cleaned up when DomainMappings are removed. (#10503, @julz)
  • Enables connection reuse between activator probe and proxy to improve first request performance after cold starts (#10228, @julz)
  • Webhooks won't remove namespace selectors added by other components (knative/pkg#1949, @markusthoemmes)

Dependencies

Added

  • github.com/blendle/zapdriver: v1.3.1
  • github.com/remyoudompheng/bigfft: 52369c6
  • golang.org/x/term: 7de9c90
  • modernc.org/cc: v1.0.0
  • modernc.org/golex: v1.0.0
  • modernc.org/mathutil: v1.0.0
  • modernc.org/strutil: v1.0.0
  • modernc.org/xc: v1.0.0
  • sigs.k8s.io/structured-merge-diff/v2: v2.0.1
  • sigs.k8s.io/structured-merge-diff: 15d366b

Changed

  • cloud.google.com/go: v0.65.0 β†’ v0.72.0
  • github.com/cncf/udpa/go: 269d4d4 β†’ efcf912
  • github.com/envoyproxy/go-control-plane: v0.9.4 β†’ v0.9.7
  • github.com/evanphx/json-patch: v4.5.0+incompatible β†’ v4.9.0+incompatible
  • github.com/google/go-cmp: v0.5.2 β†’ v0.5.4
  • github.com/google/go-containerregistry: v0.1.4 β†’ v0.2.1
  • github.com/google/martian/v3: v3.0.0 β†’ v3.1.0
  • github.com/google/pprof: 1a94d86 β†’ 3e6fc7f
  • github.com/ianlancetaylor/demangle: 5e5cf60 β†’ 28f6c0f
  • github.com/prometheus/common: v0.14.0 β†’ v0.15.0
  • golang.org/x/net: 62affa3 β†’ ac852fb
  • golang.org/x/oauth2: 5d25da1 β†’ 08078c5
  • golang.org/x/sync: 67f06af β†’ 09787c9
  • golang.org/x/sys: e3ed001 β†’ ef89a24
  • golang.org/x/text: v0.3.3 β†’ v0.3.4
  • golang.org/x/tools: c9a70fc β†’ d93e913
  • gonum.org/v1/gonum: 3f7ecaa β†’ 3d26580
  • gonum.org/v1/netlib: ec6d1f5 β†’ 7672324
  • google.golang.org/api: v0.34.0 β†’ v0.36.0
  • google.golang.org/appengine: v1.6.6 β†’ v1.6.7
  • google.golang.org/genproto: 0bd0a95 β†’ 40ec1c2
  • google.golang.org/grpc: v1.33.1 β†’ v1.34.0
  • k8s.io/api: v0.18.8 β†’ v0.18.12
  • k8s.io/apiextensions-apiserver: v0.18.8 β†’ v0.18.12
  • k8s.io/apimachinery: v0.18.8 β†’ v0.18.12
  • k8s.io/apiserver: v0.18.8 β†’ v0.18.12
  • k8s.io/client-go: v0.18.8 β†’ v0.18.12
  • k8s.io/code-generator: v0.18.8 β†’ v0.18.12
  • k8s.io/component-base: v0.18.8 β†’ v0.18.12
  • k8s.io/kube-openapi: 61e04a5 β†’ bcb3869
  • knative.dev/caching: 1a30592 β†’ 1ee4750
  • knative.dev/hack: 3d5abc3 β†’ 4ed1ecb
  • knative.dev/networking: b9f80f4 β†’ ecb89ce
  • knative.dev/pkg: 5514ab0 β†’ 51c72e2
serving - Knative Serving release v0.22.2

Published by knative-prow-releaser-robot over 3 years ago

πŸ’« New Features & Changes

  • Added an autoscaling annotation to choose a different aggregation algorithm for the autoscaling metrics. This is experimental currently. (#10840, @vagababov)
  • Added autocreateClusterDomainClaims flag to network config map. (networking#330, @julz)

🐞 Bug Fixes

  • Adds validation that a default max-scale is set if a max-scale-limit is specified in the autoscaler configmap (since otherwise the default max-scale, i.e. 0 = no max, would fail validation as it is above the max-scale-limit). (#10921, @julz)
  • Bumped the resource request and limits of the autoscaler to 100m/100Mi, 1000m/1000Mi respectively. (#10865, @markusthoemmes)
  • Fixed a regression where the pod bringup time might have a latency of 10s or more even though the container should be up quickly. (#10992, @markusthoemmes)
  • Reduced the necessary memory allocations in the activator significantly, especially with disabled tracing. (#11016, #11013, #11009, #11008, @markusthoemmes)
  • Fix the incorrect Gateway name format for DomainMapping auto TLS feature for net-istio implmenetation. (net-istio#532, @ZhiminXiang)

Dependencies

Added

Nothing has changed.

Changed

  • github.com/google/go-cmp: v0.5.4 β†’ v0.5.5
  • github.com/prometheus/common: v0.15.0 β†’ v0.19.0
  • go.opencensus.io: v0.22.6 β†’ v0.23.0
  • google.golang.org/grpc: v1.35.0 β†’ v1.36.0
  • knative.dev/caching: 1212288 β†’ 5691bb3
  • knative.dev/hack: 8368e1f β†’ b6ab329
  • knative.dev/networking: 088986a β†’ 999a770
  • knative.dev/pkg: 84c98f3 β†’ 952fdd9

Removed

Nothing has changed.

serving - Knative Serving release v0.23.0

Published by knative-prow-releaser-robot over 3 years ago

🚨 Breaking or Notable

  • Change the default post-install job to use sslip.io rather than xip.io. (#11298, @julz)

πŸ’« New Features & Changes

  • The stats scraping in the autoscaler is now sensitive to the EnableMeshPodAddressability setting. A restart of the autoscaler is required for the setting to take effect if changed. (#11161, @markusthoemmes)
  • The state keeping in the activator is now sensitive to the EnableMeshPodAddressability setting. A restart of the activator is required for the setting to take effect if changed. (#11172, @markusthoemmes)
  • Tightens the heuristic for mesh being abled in the service scraper. We now expect all errors to be related to mesh (i.e. 503 status code). This prevents accidentally falling in to service scrape mode when errors are encountered for other reasons. (#11174, @julz)

🐞 Bug Fixes

Uncategorized

  • Added schemas to all CRDs. (#11244, @markusthoemmes)
  • Changed the rollout behavior of application deployment changes (due to Knative upgrade for example) to never have less ready posd than required. (#11140, @markusthoemmes)
  • Rate limits digest resolution (10 QPS, retry back-off 1s to 1000s) to prevent exceeding quota at remote registries (#11279, @julz)
  • Revision replicas shut down 15s quicker. (#11249, @markusthoemmes)
  • The activator's proxy is now sensitive to the EnableMeshPodAddressability setting. (#11162, @markusthoemmes)
  • Update the User-Agent used during tag resolution (#10590, @jonjohnsonjr)

Dependencies

Added

  • github.com/ahmetb/gen-crd-api-reference-docs: c1402a7

Changed

  • contrib.go.opencensus.io/exporter/prometheus: 6bcf6f8 β†’ v0.3.0
  • github.com/containerd/stargz-snapshotter/estargz: a9a0c2d β†’ v0.4.1
  • github.com/envoyproxy/go-control-plane: fd9021f β†’ 668b12f
  • github.com/golang/protobuf: v1.4.3 β†’ v1.5.2
  • github.com/google/go-containerregistry/pkg/authn/k8schain: 5c4818d β†’ 9cf3ed4
  • github.com/google/go-containerregistry: 19c2b63 β†’ v0.5.0
  • github.com/prometheus/client_golang: v1.9.0 β†’ v1.10.0
  • github.com/prometheus/common: v0.19.0 β†’ v0.20.0
  • github.com/prometheus/procfs: v0.2.0 β†’ v0.6.0
  • github.com/prometheus/statsd_exporter: v0.15.0 β†’ v0.20.0
  • golang.org/x/crypto: eec23a3 β†’ 4f45737
  • golang.org/x/lint: 738671d β†’ 83fdc39
  • golang.org/x/net: 5f4716e β†’ e915ea6
  • golang.org/x/oauth2: f9ce19e β†’ 5e61552
  • golang.org/x/sync: 09787c9 β†’ 036812b
  • golang.org/x/sys: 22da62e β†’ 4fbd30e
  • golang.org/x/text: v0.3.5 β†’ v0.3.6
  • golang.org/x/time: 7e3f01d β†’ f8bda1e
  • google.golang.org/genproto: 8c77b98 β†’ 9910b6c
  • google.golang.org/grpc: v1.36.0 β†’ v1.37.0
  • google.golang.org/protobuf: v1.25.0 β†’ v1.26.0
  • knative.dev/caching: 5691bb3 β†’ 9227826
  • knative.dev/hack: b6ab329 β†’ 93ad912
  • knative.dev/networking: 999a770 β†’ ace2d33
  • knative.dev/pkg: 952fdd9 β†’ 4564797

Removed

Nothing has changed.

serving - Knative Serving release v0.21.1

Published by knative-prow-releaser-robot over 3 years ago

🚨 Breaking or Notable

πŸ’« New Features & Changes

  • Introduces autocreateClusterDomainClaim in config-network config map. This allows DomainMappings to be safely used in shared clusters by disabling automatic ClusterDomainClaim creation. With this option set to "false", cluster administrators must explicitly delegate domain names to namespaces by creating a ClusterDomainClaim with an appropriate spec.Namespace set. (#10537, @julz)
  • Domain mappings disallow mapping from cluster local domain names (generally domains under "cluster.local") (#10798, @julz)
  • Allow setting ReadOnlyRootFilesystem on the container's SecurityContext (#10560, @senthilnathan)
  • A container's readiness probe FailureThreshold & TimeoutSeconds are now defaulted to 3 and 1 respectively when a user opts into non-aggressive probing (ie. PeriodTimeout > 1) (#10700, @shinigambit)
  • Avoids implicitly adding an "Accept-Encoding: gzip" header to proxied requests if one was not already present. (#10691, @julz)
  • Gradual Rollout is possible to set on individual Revisions usingserving.knative.dev/rolloutDuration annotation, (#10561, @vagababov et al.)
  • Support Istio 1.9 (knative-sandbox/net-istio#515, @arturenault)
  • Support Contour 1.12 (knative-sandbox/net-contour#414, @mattmoor)

🐞 Bug Fixes

  • Fixes problem with domainmapping when working with auto-tls and kourier challenge
  • Fixed a bug where the activator's metrics could get stuck and thus scale to and from zero didn't work as expected. (#10729, @markusthoemmes)
  • Fixes a race in Queue Proxy drain logic that could, in a very unlikely edge case, lead to the pre-stop hook not exiting even though draining has finished (#10781, @julz)
  • Avoid slow out-of-memory issue related to metrics (knative/pkg#2005, @skonto)
  • Stop reporting reflector metrics since they were removed upstream (knative/pkg#2020, @skonto)

Dependencies

Added

  • github.com/containerd/stargz-snapshotter/estargz: a9a0c2d
  • github.com/gobuffalo/flect: v0.2.2
  • github.com/google/go-containerregistry/pkg/authn/k8schain: 5c4818d
  • github.com/jmespath/go-jmespath/internal/testify: v1.5.1
  • github.com/josharian/intern: v1.0.0
  • github.com/moby/term: 672ec06
  • github.com/stoewer/go-strcase: v1.2.0
  • gotest.tools/v3: v3.0.2
  • sigs.k8s.io/structured-merge-diff/v4: v4.0.2

Changed

Removed

  • github.com/coreos/go-etcd: v2.0.0+incompatible
  • github.com/cpuguy83/go-md2man: v1.0.10
  • github.com/gobuffalo/envy: v1.7.1
  • github.com/jessevdk/go-flags: v1.4.0
  • github.com/joho/godotenv: v1.3.0
  • github.com/markbates/inflect: v1.0.4
  • github.com/opencontainers/runc: v0.1.1
  • github.com/russross/blackfriday: v1.5.2
  • github.com/ugorji/go/codec: d75b2dc
  • sigs.k8s.io/structured-merge-diff/v2: v2.0.1
  • sigs.k8s.io/structured-merge-diff/v3: 43c19bb
  • sigs.k8s.io/structured-merge-diff: 15d366b
serving - Knative Serving release v0.22.1

Published by knative-prow-releaser-robot over 3 years ago

πŸ’« New Features & Changes

  • Added an autoscaling annotation to choose a different aggregation algorithm for the autoscaling metrics. This is experimental currently. (#10840, @vagababov)
  • Added autocreateClusterDomainClaims flag to network config map. (networking#330, @julz)

🐞 Bug Fixes

  • Adds validation that a default max-scale is set if a max-scale-limit is specified in the autoscaler configmap (since otherwise the default max-scale, i.e. 0 = no max, would fail validation as it is above the max-scale-limit). (#10921, @julz)
  • Bumped the resource request and limits of the autoscaler to 100m/100Mi, 1000m/1000Mi respectively. (#10865, @markusthoemmes)
  • Fixed a regression where the pod bringup time might have a latency of 10s or more even though the container should be up quickly. (#10992, @markusthoemmes)
  • Reduced the necessary memory allocations in the activator significantly, especially with disabled tracing. (#11016, #11013, #11009, #11008, @markusthoemmes)
  • Fix the incorrect Gateway name format for DomainMapping auto TLS feature for net-istio implmenetation. (net-istio#532, @ZhiminXiang)

Dependencies

Added

Nothing has changed.

Changed

  • github.com/google/go-cmp: v0.5.4 β†’ v0.5.5
  • github.com/prometheus/common: v0.15.0 β†’ v0.19.0
  • go.opencensus.io: v0.22.6 β†’ v0.23.0
  • google.golang.org/grpc: v1.35.0 β†’ v1.36.0
  • knative.dev/caching: 1212288 β†’ 5691bb3
  • knative.dev/hack: 8368e1f β†’ b6ab329
  • knative.dev/networking: 088986a β†’ 999a770
  • knative.dev/pkg: 84c98f3 β†’ 952fdd9

Removed

Nothing has changed.