Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -13,10 +13,10 @@ require (
k8s.io/api v0.35.4
k8s.io/apimachinery v0.35.4
k8s.io/client-go v0.35.4
knative.dev/client/pkg v0.0.0-20260429013708-479f2162b627
knative.dev/client/pkg v0.0.0-20260512023952-81e768d183a2
knative.dev/hack v0.0.0-20260428014158-b2a37f1b6e7b
knative.dev/networking v0.0.0-20260506015723-9b427f7c8091
knative.dev/serving v0.49.1-0.20260504070613-3d28fb878e74
knative.dev/serving v0.49.1-0.20260512221929-dbaab46874d2
)

require (
Expand Down Expand Up @@ -104,8 +104,8 @@ require (
k8s.io/klog/v2 v2.130.1 // indirect
k8s.io/kube-openapi v0.0.0-20250910181357-589584f1c912 // indirect
k8s.io/utils v0.0.0-20251002143259-bc988d571ff4 // indirect
knative.dev/eventing v0.49.0 // indirect
knative.dev/pkg v0.0.0-20260505204821-021ad709ec68 // indirect
knative.dev/eventing v0.49.1-0.20260511150731-43e651f7940a // indirect
knative.dev/pkg v0.0.0-20260507212125-df317a52d112 // indirect
sigs.k8s.io/gateway-api v1.1.0 // indirect
sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 // indirect
sigs.k8s.io/kustomize/api v0.20.1 // indirect
Expand Down
16 changes: 8 additions & 8 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -303,18 +303,18 @@ k8s.io/kube-openapi v0.0.0-20250910181357-589584f1c912 h1:Y3gxNAuB0OBLImH611+UDZ
k8s.io/kube-openapi v0.0.0-20250910181357-589584f1c912/go.mod h1:kdmbQkyfwUagLfXIad1y2TdrjPFWp2Q89B3qkRwf/pQ=
k8s.io/utils v0.0.0-20251002143259-bc988d571ff4 h1:SjGebBtkBqHFOli+05xYbK8YF1Dzkbzn+gDM4X9T4Ck=
k8s.io/utils v0.0.0-20251002143259-bc988d571ff4/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
knative.dev/client/pkg v0.0.0-20260429013708-479f2162b627 h1:8baqKVjdV9HSVN5QZmTnE7pJgLJVqeSp/vgxQNABQf4=
knative.dev/client/pkg v0.0.0-20260429013708-479f2162b627/go.mod h1:GrVjnB3hEfpNJ0LZte0tf1wMNhMjs0S8LI+ywMQMmtk=
knative.dev/eventing v0.49.0 h1:Gole9D1AXnZVBCzoqO00/5n8MApy8rRJpTHYXvUFfQc=
knative.dev/eventing v0.49.0/go.mod h1:5lsUu0xHPLQpfVW7kmYXB7uRCUOnGGPsE87rx3hrRsM=
knative.dev/client/pkg v0.0.0-20260512023952-81e768d183a2 h1:LT4n99lft44+51dX+V3a272ePEpIa8Ig0bKVEN87BgY=
knative.dev/client/pkg v0.0.0-20260512023952-81e768d183a2/go.mod h1:V/Vqv4RzRcalY6F6PB+bQ56ePe64kmR49NzUNta17+w=
knative.dev/eventing v0.49.1-0.20260511150731-43e651f7940a h1:Iq198f0CCOm+gIArlRzxyw+Ini/izupUjBjqyZy6GoM=
knative.dev/eventing v0.49.1-0.20260511150731-43e651f7940a/go.mod h1:rqixbt+It0fwbQQuPjVDAEiLi12KnLG3Bmul3T5IHAM=
knative.dev/hack v0.0.0-20260428014158-b2a37f1b6e7b h1:MvbV2F2BdI8qKrYYUhDwbUZbX0BAYRSIpXM2TOtTvs0=
knative.dev/hack v0.0.0-20260428014158-b2a37f1b6e7b/go.mod h1:L5RzHgbvam0u8QFHfzCX6MKxu/a/gIGEdaRBqNiVbl0=
knative.dev/networking v0.0.0-20260506015723-9b427f7c8091 h1:Fg091hEPQvqKQYBO7hQ20yID1wFbD4hIDz552mI4L14=
knative.dev/networking v0.0.0-20260506015723-9b427f7c8091/go.mod h1:1+QQXuA6k0gzGJ/Lpp+mZQebDXEfybMu3q+C8a1g54Q=
knative.dev/pkg v0.0.0-20260505204821-021ad709ec68 h1:cZz3AkOusfsFBJCOKiCiadBbHjbEiqlsu/55gzRhPZM=
knative.dev/pkg v0.0.0-20260505204821-021ad709ec68/go.mod h1:JM+8ds+MTBtPK2aCp6pGUHQx9gNIL8wuMhqr0sxtDog=
knative.dev/serving v0.49.1-0.20260504070613-3d28fb878e74 h1:rt3Hguyh3lWD1U9p7k1LWl9V9L2egRAnAZf4d0wJkdU=
knative.dev/serving v0.49.1-0.20260504070613-3d28fb878e74/go.mod h1:KXvVnXohxsbE3rCRbr1TZlxeC20qIzhVckDwbsgLWPI=
knative.dev/pkg v0.0.0-20260507212125-df317a52d112 h1:ftdGpzukmrlcTRTCZytQQ+mAMUAFqcq/cwIUwc/Lk2s=
knative.dev/pkg v0.0.0-20260507212125-df317a52d112/go.mod h1:JM+8ds+MTBtPK2aCp6pGUHQx9gNIL8wuMhqr0sxtDog=
knative.dev/serving v0.49.1-0.20260512221929-dbaab46874d2 h1:8zqDL3WhXBqAvePlBnYZDGj5lXS19JnVca3gu+A17j4=
knative.dev/serving v0.49.1-0.20260512221929-dbaab46874d2/go.mod h1:3hXF5IUiZow3USDS0rA5UQeZCP30OwuDalcQS96XmFQ=
sigs.k8s.io/gateway-api v1.1.0 h1:DsLDXCi6jR+Xz8/xd0Z1PYl2Pn0TyaFMOPPZIj4inDM=
sigs.k8s.io/gateway-api v1.1.0/go.mod h1:ZH4lHrL2sDi0FHZ9jjneb8kKnGzFWyrTya35sWUTrRs=
sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 h1:IpInykpT6ceI+QxKBbEflcR5EXP7sU1kvOlxwZh5txg=
Expand Down
4 changes: 4 additions & 0 deletions vendor/knative.dev/serving/pkg/apis/config/features.go
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,7 @@ const (
FeaturePodSpecShareProcessNamespace = "kubernetes.podspec-shareprocessnamespace"
FeaturePodSpecTolerations = "kubernetes.podspec-tolerations"
FeaturePodSpecTopologySpreadConstraints = "kubernetes.podspec-topologyspreadconstraints"
FeaturePodSpecVolumesEphemeral = "kubernetes.podspec-volumes-ephemeral"
FeaturePodSpecVolumesImage = "kubernetes.podspec-volumes-image"
)

Expand All @@ -102,6 +103,7 @@ func defaultFeaturesConfig() *Features {
PodSpecVolumesHostPath: Disabled,
PodSpecVolumesMountPropagation: Disabled,
PodSpecVolumesCSI: Disabled,
PodSpecVolumesEphemeral: Disabled,
PodSpecVolumesImage: Disabled,
PodSpecPersistentVolumeClaim: Disabled,
PodSpecPersistentVolumeWrite: Disabled,
Expand Down Expand Up @@ -141,6 +143,7 @@ func NewFeaturesConfigFromMap(data map[string]string) (*Features, error) {
asFlag(FeaturePodSpecHostPID, &nc.PodSpecHostPID),
asFlag(FeaturePodSpecHostPath, &nc.PodSpecVolumesHostPath),
asFlag(FeaturePodSpecVolumesCSI, &nc.PodSpecVolumesCSI),
asFlag(FeaturePodSpecVolumesEphemeral, &nc.PodSpecVolumesEphemeral),
asFlag(FeaturePodSpecVolumesImage, &nc.PodSpecVolumesImage),
asFlag(FeaturePodSpecInitContainers, &nc.PodSpecInitContainers),
asFlag(FeaturePodSpecVolumesMountPropagation, &nc.PodSpecVolumesMountPropagation),
Expand Down Expand Up @@ -187,6 +190,7 @@ type Features struct {
PodSpecVolumesHostPath Flag
PodSpecVolumesMountPropagation Flag
PodSpecVolumesCSI Flag
PodSpecVolumesEphemeral Flag
PodSpecVolumesImage Flag
PodSpecInitContainers Flag
PodSpecPersistentVolumeClaim Flag
Expand Down
4 changes: 4 additions & 0 deletions vendor/knative.dev/serving/pkg/apis/serving/fieldmask.go
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,10 @@ func VolumeSourceMask(ctx context.Context, in *corev1.VolumeSource) *corev1.Volu
out.CSI = in.CSI
}

if cfg.Features.PodSpecVolumesEphemeral != config.Disabled {
out.Ephemeral = in.Ephemeral
}

if cfg.Features.PodSpecVolumesImage != config.Disabled {
out.Image = in.Image
}
Expand Down
21 changes: 20 additions & 1 deletion vendor/knative.dev/serving/pkg/apis/serving/k8s_validation.go
Original file line number Diff line number Diff line change
Expand Up @@ -138,6 +138,10 @@ func validateVolume(ctx context.Context, volume corev1.Volume) *apis.FieldError
errs = errs.Also(&apis.FieldError{Message: fmt.Sprintf("CSI volume support is disabled, "+
"but found CSI volume %s", volume.Name)})
}
if volume.Ephemeral != nil && features.PodSpecVolumesEphemeral != config.Enabled {
errs = errs.Also(&apis.FieldError{Message: fmt.Sprintf("Ephemeral volume support is disabled, "+
"but found Ephemeral volume %s", volume.Name)})
}
errs = errs.Also(apis.CheckDisallowedFields(volume, *VolumeMask(ctx, &volume)))
if volume.Name == "" {
errs = apis.ErrMissingField("name")
Expand Down Expand Up @@ -182,6 +186,10 @@ func validateVolume(ctx context.Context, volume corev1.Volume) *apis.FieldError
specified = append(specified, "csi")
}

if vs.Ephemeral != nil {
specified = append(specified, "ephemeral")
}

if vs.Image != nil {
specified = append(specified, "image")
errs = errs.Also(validateImageVolumeSource(vs.Image).ViaField("image"))
Expand All @@ -202,6 +210,9 @@ func validateVolume(ctx context.Context, volume corev1.Volume) *apis.FieldError
if cfg.Features.PodSpecVolumesCSI == config.Enabled {
fieldPaths = append(fieldPaths, "csi")
}
if cfg.Features.PodSpecVolumesEphemeral == config.Enabled {
fieldPaths = append(fieldPaths, "ephemeral")
}
if cfg.Features.PodSpecVolumesImage == config.Enabled {
fieldPaths = append(fieldPaths, "image")
}
Expand Down Expand Up @@ -545,11 +556,17 @@ func validateSidecarContainer(ctx context.Context, container corev1.Container, v
errs = errs.Also(apis.CheckDisallowedFields(*container.ReadinessProbe,
*ProbeMask(&corev1.Probe{})).ViaField("readinessProbe"))
}
if container.StartupProbe != nil {
errs = errs.Also(apis.CheckDisallowedFields(*container.StartupProbe,
*ProbeMask(&corev1.Probe{})).ViaField("startupProbe"))
}
} else if cfg.Features.MultiContainerProbing == config.Enabled {
// Liveness Probes
errs = errs.Also(validateProbe(container.LivenessProbe, nil, false).ViaField("livenessProbe"))
// Readiness Probes
errs = errs.Also(validateReadinessProbe(container.ReadinessProbe, nil, false).ViaField("readinessProbe"))
// Startup Probes
errs = errs.Also(validateProbe(container.StartupProbe, nil, false).ViaField("startupProbe"))
}

return errs.Also(validate(ctx, container, volumes))
Expand Down Expand Up @@ -591,6 +608,8 @@ func ValidateUserContainer(ctx context.Context, container corev1.Container, volu
errs = errs.Also(validateProbe(container.LivenessProbe, &port, true).ViaField("livenessProbe"))
// Readiness Probes
errs = errs.Also(validateReadinessProbe(container.ReadinessProbe, &port, true).ViaField("readinessProbe"))
// Startup Probes
errs = errs.Also(validateProbe(container.StartupProbe, &port, true).ViaField("startupProbe"))
return errs.Also(validate(ctx, container, volumes))
}

Expand Down Expand Up @@ -717,7 +736,7 @@ func validateVolumeMounts(ctx context.Context, mounts []corev1.VolumeMount, volu
}
seenMountPath.Insert(path.Clean(vm.MountPath))

shouldCheckReadOnlyVolume := volumes[vm.Name].EmptyDir == nil && volumes[vm.Name].PersistentVolumeClaim == nil
shouldCheckReadOnlyVolume := volumes[vm.Name].EmptyDir == nil && volumes[vm.Name].PersistentVolumeClaim == nil && volumes[vm.Name].Ephemeral == nil
if shouldCheckReadOnlyVolume && !vm.ReadOnly {
errs = errs.Also((&apis.FieldError{
Message: "volume mount should be readOnly for this type of volume",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ func (rs *RevisionSpec) applyDefault(ctx context.Context, container *corev1.Cont

vNames := make(sets.Set[string])
for _, v := range rs.PodSpec.Volumes {
if v.EmptyDir != nil || v.PersistentVolumeClaim != nil {
if v.EmptyDir != nil || v.PersistentVolumeClaim != nil || v.Ephemeral != nil {
vNames.Insert(v.Name)
}
}
Expand Down
8 changes: 4 additions & 4 deletions vendor/modules.txt
Original file line number Diff line number Diff line change
Expand Up @@ -926,7 +926,7 @@ k8s.io/utils/net
k8s.io/utils/pointer
k8s.io/utils/ptr
k8s.io/utils/trace
# knative.dev/client/pkg v0.0.0-20260429013708-479f2162b627
# knative.dev/client/pkg v0.0.0-20260512023952-81e768d183a2
## explicit; go 1.25.0
knative.dev/client/pkg/apis/client
knative.dev/client/pkg/apis/client/v1alpha1
Expand All @@ -953,7 +953,7 @@ knative.dev/client/pkg/util/errors
knative.dev/client/pkg/util/mock
knative.dev/client/pkg/util/test
knative.dev/client/pkg/wait
# knative.dev/eventing v0.49.0
# knative.dev/eventing v0.49.1-0.20260511150731-43e651f7940a
## explicit; go 1.25.0
knative.dev/eventing/pkg/apis/common/integration/v1alpha1
knative.dev/eventing/pkg/apis/config
Expand Down Expand Up @@ -1001,7 +1001,7 @@ knative.dev/networking/pkg/client/clientset/versioned/typed/networking/v1alpha1/
knative.dev/networking/pkg/config
knative.dev/networking/pkg/http/header
knative.dev/networking/pkg/ingress
# knative.dev/pkg v0.0.0-20260505204821-021ad709ec68
# knative.dev/pkg v0.0.0-20260507212125-df317a52d112
## explicit; go 1.25.0
knative.dev/pkg/apis
knative.dev/pkg/apis/duck
Expand Down Expand Up @@ -1045,7 +1045,7 @@ knative.dev/pkg/test/ingress
knative.dev/pkg/test/logging
knative.dev/pkg/test/spoof
knative.dev/pkg/tracker
# knative.dev/serving v0.49.1-0.20260504070613-3d28fb878e74
# knative.dev/serving v0.49.1-0.20260512221929-dbaab46874d2
## explicit; go 1.25.0
knative.dev/serving/pkg/apis/autoscaling
knative.dev/serving/pkg/apis/autoscaling/v1alpha1
Expand Down
Loading