Releases: knative-extensions/net-kourier
Releases · knative-extensions/net-kourier
v1.10.0
Changes by Kind
Enhancement
- A PodDistruptionBudget and a HorizontalPodAutoscaler were added for the 3scale-kourier-gateway deployment (#990, @ReToCode)
Bug or Regression
- Kourier-gateway [2023-04-04 05:06:31.483][1][warning][config] [./source/common/config/grpc_stream.h:160] StreamAggregatedResources gRPC config stream closed: 13, (#1025, @ryutoyasugi)
Uncategorized
Dependencies
Added
Nothing has changed.
Changed
- golang.org/x/net: a158d28 → v0.7.0
- golang.org/x/sys: 8c9f86f → v0.5.0
- golang.org/x/term: 03fcf44 → v0.5.0
- golang.org/x/text: v0.3.7 → v0.7.0
- knative.dev/control-protocol: cffe208 → d9cda76
- knative.dev/hack: c7cfcb0 → f591fea
- knative.dev/networking: db2bcbe → e5d04e8
- knative.dev/pkg: 247510c → dfad48e
- knative.dev/reconciler-test: 894bc70 → 6c21623
Removed
Nothing has changed.
v1.9.2
Changes since 1.9.1
Rebuilt with go1.19.6 to address CVEs
v1.8.3
Changes since 1.8.2
Rebuilt with go1.19.6 to address CVEs
v1.9.1
Changes since 1.9.0
Bumped dependencies to address CVEs
v1.8.2
Changes since 1.8.1
Bumped dependencies to address CVEs
v1.9.0
Changes by Kind
Enhancement
- Add support for trusted hops count parameter (#889, @thomas-tacquet)
- Adds prometheus scraping annotations for net-kourier, so Prometheus Operator users should now be able to collect statistics automatically. (#978, @evankanderson)
- Kourier controller and gateway manifests have the resource limits/requests. (#979, @nak3)
Dependencies
Added
Nothing has changed.
Changed
- go.uber.org/goleak: 6911603 → v1.2.0
- k8s.io/api: v0.25.2 → v0.25.4
- k8s.io/apiextensions-apiserver: v0.25.2 → v0.25.4
- k8s.io/apimachinery: v0.25.2 → v0.25.4
- k8s.io/apiserver: v0.25.2 → v0.25.4
- k8s.io/client-go: v0.25.2 → v0.25.4
- k8s.io/code-generator: v0.25.2 → v0.25.4
- k8s.io/component-base: v0.25.2 → v0.25.4
- k8s.io/gengo: 397b4ae → fad74ee
- k8s.io/klog/v2: 0990e81 → 9ae4992
- k8s.io/utils: ee6ede2 → 8e77b1f
- knative.dev/control-protocol: 3e2f878 → cffe208
- knative.dev/hack: 3fdc50b → c7cfcb0
- knative.dev/networking: 58f3e62 → db2bcbe
- knative.dev/pkg: 714b763 → 247510c
- knative.dev/reconciler-test: 090970c → 894bc70
- sigs.k8s.io/apiserver-network-proxy/konnectivity-client: v0.0.32 → v0.0.33
Removed
Nothing has changed.
Knative Net Kourier release v1.8.1
Changes since 1.8.0
- Rebuilt with go1.19.4 - see CVE details https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU
Knative Net Kourier release v1.7.1
Changes since 1.7.0
- Rebuilt with go1.19.4 - see CVE details https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU
Changes since v1.6
- The timeout can be configured via stream-idle-timeout in config-kourier, the default value is set to "infinity" which means there is no timeout. Users can change this value in config-kourier with decimal numbers plus a unit suffix such as "ns", "us" (or "µs"), "ms", "s", "m", "h" (#878, @xxinran)
Dependencies
Added
Nothing has changed.
Changed
- golang.org/x/sync: 036812b → 886fb93
- k8s.io/api: v0.23.8 → v0.23.9
- k8s.io/apiextensions-apiserver: v0.23.8 → v0.23.9
- k8s.io/apimachinery: v0.23.8 → v0.23.9
- k8s.io/apiserver: v0.23.8 → v0.23.9
- k8s.io/client-go: v0.23.8 → v0.23.9
- k8s.io/code-generator: v0.23.8 → v0.23.9
- k8s.io/component-base: v0.23.8 → v0.23.9
- k8s.io/gengo: 4627b89 → 397b4ae
- k8s.io/klog/v2: 43cc75f → 0990e81
- knative.dev/control-protocol: 827b25d → f18dbde
- knative.dev/hack: 65c463a → 8d1e4cc
- knative.dev/networking: f087178 → e51df7c
- knative.dev/pkg: e60d250 → 4a03844
- knative.dev/reconciler-test: f05db88 → 177f826
Removed
- k8s.io/klog: v1.0.0
Knative Net Kourier release v1.6.1
Changes since 1.6.0
- Rebuilt with go1.19.4 - see CVE details https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU
Changes since v1.5
Enhancement
- Add a new configuration parameter for enabling port-level internal services isolation. See documentation for more details. (#852, @lionelvillard)
Bug or Regression
- Fix SNI with proxy_protocol (#869, @RamyChaabane)
Uncategorized
- Secret informer in net-kourier ingress controller can filter secrets based on the existence of a label key
networking.internal.knative.dev/certificate-uid
. Users are required to add the label key for custom secrets defined in ingresses.
For special cases users are recommended to reach out to Knative community.
In case of AutoTLS provided by Knative net-certmanager or net-http01 this is done transparently.
To enable this behavior at net-kourier set env var ENABLE_SECRET_INFORMER_FILTERING_BY_CERT_UI to true.
This will be available by default in future releases. (#862, @skonto)
Dependencies
Added
- github.com/cloudevents/sdk-go/v2: v2.4.1
- k8s.io/klog: v1.0.0
- knative.dev/control-protocol: 827b25d
- knative.dev/reconciler-test: f05db88
Changed
- github.com/imdario/mergo: v0.3.5 → v0.3.9
- gopkg.in/yaml.v3: 496545a → v3.0.1
- k8s.io/api: v0.23.5 → v0.23.8
- k8s.io/apiextensions-apiserver: v0.23.4 → v0.23.8
- k8s.io/apimachinery: v0.23.5 → v0.23.8
- k8s.io/apiserver: v0.23.4 → v0.23.8
- k8s.io/client-go: v0.23.5 → v0.23.8
- k8s.io/code-generator: v0.23.5 → v0.23.8
- k8s.io/component-base: v0.23.4 → v0.23.8
- knative.dev/hack: 12d3e2a → 65c463a
- knative.dev/networking: 22d1b93 → f087178
- knative.dev/pkg: 19adf79 → e60d250
- sigs.k8s.io/apiserver-network-proxy/konnectivity-client: v0.0.27 → v0.0.30
Removed
Nothing has changed.