Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update grpc version #367

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jan 20, 2023

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update Pending
google.golang.org/grpc v1.51.0 -> v1.69.0 age adoption passing confidence require minor v1.69.2
grpc/grpc 1.51 -> 1.68 age adoption passing confidence minor
grpc/grpc-java 1.51 -> 1.69 age adoption passing confidence minor

Release Notes

grpc/grpc-go (google.golang.org/grpc)

v1.69.0: Release 1.69.0

Compare Source

Known Issues

  • The recently added grpc.NewClient function is incompatible with forward proxies, because it resolves the target hostname on the client instead of passing the hostname to the proxy. A fix is expected to be a part of grpc-go v1.70. (#​7556)

New Features

  • stats/opentelemetry: Introduce new APIs to enable OpenTelemetry instrumentation for metrics on servers and clients (#​7874)
  • xdsclient: add support to fallback to lower priority servers when higher priority ones are down (#​7701)
  • dns: Add support for link local IPv6 addresses (#​7889)
  • The new experimental pickfirst LB policy (disabled by default) supports Happy Eyeballs, interleaving IPv4 and IPv6 address as described in RFC-8305 section 4, to attempt connections to multiple backends concurrently. The experimental pickfirst policy can be enabled by setting the environment variable GRPC_EXPERIMENTAL_ENABLE_NEW_PICK_FIRST to true. (#​7725, #​7742)
  • balancer/pickfirst: Emit metrics from the pick_first load balancing policy (#​7839)
  • grpc: export MethodHandler, which is the type of an already-exported field in MethodDesc (#​7796)

Bug Fixes

  • credentials/google: set scope for application default credentials (#​7887)
  • xds: fix edge-case issues where some clients or servers would not initialize correctly or would not receive errors when resources are invalid or unavailable if another channel or server with the same target was already in use . (#​7851, #​7853)
  • examples: fix the debugging example, which was broken by a recent change (#​7833)

Behavior Changes

  • client: update retry attempt backoff to apply jitter per updates to gRFC A6. (#​7869)
  • balancer/weightedroundrobin: use the pick_first LB policy to manage connections (#​7826)

API Changes

  • balancer: An internal method is added to the balancer.SubConn interface to force implementors to embed a delegate implementation. This requirement is present in the interface documentation, but wasn't enforced earlier. (#​7840)

Performance Improvements

  • mem: implement a ReadAll() method for more efficient io.Reader consumption (#​7653)
  • mem: use slice capacity instead of length to determine whether to pool buffers or directly allocate them (#​7702)

Documentation

  • examples/csm_observability: Add xDS Credentials and switch server to be xDS enabled (#​7875)

v1.68.2: Release 1.68.2

Compare Source

Dependencies

  • Remove the experimental stats/opentelemetry module and instead add the experimental packages it contains directly into the main google.golang.org/grpc module (#​7936)

v1.68.1: Release 1.68.1

Compare Source

Bug Fixes

  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#​7861)

Dependencies

  • Relax minimum Go version requirement from go1.22.7 to go1.22. (#​7831)

v1.68.0: Release 1.68.0

Compare Source

Behavior Changes

  • stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#​7740)
  • orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#​7663)
  • client: ClientConn.Close() now closes transports simultaneously and waits for transports to be closed before returning. (#​7666)
  • credentials: TLS credentials created via NewTLS that use tls.Config.GetConfigForClient will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using the GetConfigForClient option. (#​7709)

Bug Fixes

  • transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#​7662)
  • mem: reuse buffers more accurately by using slice capacity instead of length (#​7702)
  • status: Fix regression caused by #​6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1. (#​7724)

Dependencies

  • Bump minimum supported Go version to go1.22.7. (#​7624)

v1.67.3: Release 1.67.3

Compare Source

Dependencies

  • Remove the experimental stats/opentelemetry module and instead add the experimental packages it contains directly into the main google.golang.org/grpc module.

v1.67.2: Release 1.67.2

Compare Source

Bug Fixes

  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#​7861)

v1.67.1: Release 1.67.1

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.67.0: Release 1.67.0

Compare Source

Bug Fixes

  • ringhash: when used with multiple EDS priorities, fix bug that could prevent a higher priority from recovering from transient failure. (#​7364)

Behavior Changes

  • In accordance with RFC 7540, clients and servers will now reject TLS connections that don't support ALPN. This can be disabled by setting the environment variable GRPC_ENFORCE_ALPN_ENABLED to false (case insensitive). Please file a bug if you encounter any issues with this behavior. The environment variable to revert this behavior will be removed in an upcoming release. (#​7535)

v1.66.3: Release 1.66.3

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.66.2: Release 1.66.2

Compare Source

Dependencies

  • Remove unintentional dependency on the testing package (#​7579)
  • Remove unintentional dependency on the flate package (#​7595)

Bug Fixes

  • client: fix a bug that prevented memory reuse after handling unary RPCs (#​7571)

v1.66.1

Compare Source

v1.66.0: Release 1.66.0

Compare Source

New Features

Bug Fixes

  • grpc: Clients now return status code INTERNAL instead of UNIMPLEMENTED when the server uses an unsupported compressor. This is consistent with the gRPC compression spec. (#​7461)
  • transport: Fix a bug which could result in writes busy looping when the underlying conn.Write returns errors (#​7394)
  • client: fix race that could lead to orphaned connections and associated resources. (#​7390)
  • xds: use locality from the connected address for load reporting with pick_first (#​7378)
    • without this fix, if a priority contains multiple localities with pick_first, load was reported for the wrong locality
  • client: prevent hanging during ClientConn.Close() when the network is unreachable (#​7540)

Performance Improvements

  • transport: double buffering is avoided when using an http connect proxy and the target server waits for client to send the first message. (#​7424)
  • codec: Implement a new Codec which uses buffer recycling for encoded message (#​7356)

v1.65.1: Release 1.65.1

Compare Source

Bug Fixes

v1.65.0: Release 1.65.0

Compare Source

Dependencies

  • Change support policy to cover only the latest TWO releases of Go, matching the policy for Go itself. See #​7249 for more information. (#​7250)
  • Update x/net/http2 to address CVE-2023-45288 (#​7282)

Behavior Changes

  • credentials/tls: clients and servers will now reject connections that don't support ALPN when environment variable GRPC_ENFORCE_ALPN_ENABLED is set to "true" (case insensitive). (#​7184)
    • NOTE: this behavior will become the default in a future release.
  • metadata: remove String method from MD to make printing more consistent (#​7373)

New Features

  • grpc: add WithMaxCallAttempts to configure gRPC's retry behavior per-channel. (#​7229)

Bug Fixes

  • ringhash: properly apply endpoint weights instead of ignoring them (#​7156)
  • xds: fix a bug that could cause xds-enabled servers to stop accepting new connections after handshaking errors (#​7128)

v1.64.1: Release 1.64.1

Compare Source

Dependencies

v1.64.0: Release 1.64.0

Compare Source

API Changes

  • stats: Deprecate InPayload.Data and OutPayload.Data; they were experimental and will be deleted in the next release (#​7121)

Behavior Changes

  • codec: Remove handling of environment variable GRPC_GO_ADVERTISE_COMPRESSORS to suppress setting supported compressors in grpc-accept-encoding header. Compressors will always be advertised, as they have been by default for some time (#​7203)

New Features

  • resolver/dns: Add SetMinResolutionInterval to set the minimum interval at which DNS re-resolutions may occur (#​6962)
  • peer/peer: Implement the fmt.Stringer interface for pretty printing Peer, and
  • metadata/metadata: Implement the fmt.Stringer interface for pretty printing MD (#​7137)

Performance Improvements

  • client: Improve RPC performance by reducing work while holding a lock (#​7132)

Bug Fixes

  • transport/server: Display the proper timeout value when keepalive pings are not ack'd in time (#​7038)
  • channelz: Fix bug that was causing the subchannel's target to be unset (#​7189)
  • stats: Fix bug where peer was not set in context when calling stats handler for OutPayload, InPayload, and End (#​7096)

Dependencies

  • deps: Remove dependency on deprecated github.com/golang/protobuf module (#​7122)

Documentation

  • grpc: Deprecate WithBlock, WithReturnConnectionError, FailOnNonTempDialError which are ignored by NewClient (#​7097)
  • grpc: Deprecate Dial and DialContext. These will continue to be supported throughout 1.x, but are deprecated to direct users to NewClient (See #​7090 for more information)
  • examples: Add custom lb example (#​6691)

v1.63.3: Release 1.63.3

Compare Source

Dependencies

v1.63.2: Release 1.63.2

Compare Source

Bugs

  • Fix the user agent string

v1.63.1: Release 1.63.1

Compare Source

  • grpc: un-deprecate Dial and DialContext and cherry-pick

v1.63.0: Release 1.63.0

Compare Source

Behavior Changes

  • grpc: Return canonical target string from resolver.Address.String() (experimental) (#​6923)
  • client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#​6983)

New Features

  • grpc: add ClientConn.CanonicalTarget() to return the canonical target string. (#​7006)
  • xds: implement LRS named metrics support (gRFC A64) (#​7027)
  • grpc: introduce grpc.NewClient to allow users to create new clients in idle mode and with "dns" as the default resolver (#​7010)

API Changes

  • grpc: stabilize experimental method ClientConn.Target() (#​7006)

Bug Fixes

  • xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#​7026)
  • server: Fix some errors returned by a server when using a grpc.Server as an http.Handler with the Go stdlib HTTP server (#​6989)
  • resolver/dns: add SetResolvingTimeout to allow configuring the DNS resolver's global timeout (#​6917)
  • Set the security level of Windows named pipes to NoSecurity (#​6956)

v1.62.2: Release 1.62.2

Compare Source

Dependencies

v1.62.1: Release 1.62.1

Compare Source

Bug Fixes

  • xds: fix a bug that results in no matching virtual host found RPC errors due to a difference between the target and LDS resource names (#​6997)
  • server: fixed stats handler data InPayload.Length for unary RPC calls (#​6766)
  • grpc: the experimental RecvBufferPool DialOption and ServerOption are now active during unary RPCs with compression (#​6766)
  • grpc: trim whitespaces in accept-encoding header before determining compressors

v1.62.0: Release 1.62.0

Compare Source

New Features

  • grpc: Add StaticMethod CallOption as a signal to stats handler that a method is safe to use as an instrument key (#​6986)

Behavior Changes

  • grpc: Return canonical target string from ClientConn.Target() and resolver.Address.String() (#​6923)

Bug Fixes

  • server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#​6977)

Performance Improvements

  • *: Allow building without x/net/trace by using grpcnotrace to enable dead code elimination (#​6954)
  • rand: improve performance and simplify implementation of grpcrand by adopting math/rand's top-level functions for go version 1.21.0 and newer. (#​6925)

Dependencies

  • *: Use google.golang.org/protobuf/proto instead of github.com/golang/protobuf. (#​6919)

[!NOTE]
The above change in proto library usage introduces a minor behavior change within those libraries. The old github.com/golang/protobuf library would error if given a nil message to Marshal, while the new google.golang.org/protobuf library will successfully output zero bytes in this case. This means server method handlers that did return nil, nil will now return an empty message and no error, while it used to return an error. This also affects the client side, where clients sending nil messages used to fail without sending the RPC, and now they will send an empty message.

v1.61.2: Release 1.61.2

Compare Source

Dependencies

v1.61.1: Release 1.61.1

Compare Source

Bug Fixes

  • server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#​6977)

v1.61.0: Release 1.61.0

Compare Source

New Features

  • resolver: provide method, AuthorityOverrider, to allow resolver.Builders to override the default authority for a ClientConn. (EXPERIMENTAL) (#​6752)
  • xds: add support for mTLS Credentials in xDS bootstrap (gRFC A65) (#​6757)
  • server: add grpc.WaitForHandlers ServerOption to cause Server.Stop to block until method handlers return. (EXPERIMENTAL) (#​6922)

Performance Improvements

Bug Fixes

  • client: correctly enable TCP keepalives with OS defaults on windows (#​6863)
  • server: change some stream operations to return UNAVAILABLE instead of UNKNOWN when underlying connection is broken (#​6891)
  • server: fix GracefulStop to block until all method handlers return (v1.60 regression). (#​6922)
  • server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (EXPERIMENTAL). (#​6856)
  • reflection: do not send invalid descriptors to clients for files that cannot be fully resolved (#​6771)
  • xds: don't fail channel/server startup when xds creds is specified, but bootstrap is missing certificate providers (#​6848)
  • xds: Atomically read and write xDS security configuration client side (#​6796)
  • xds/server: fix RDS handling for non-inline route configs (#​6915)

v1.60.1

Compare Source

Bug Fixes

  • server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (experimental feature).

v1.60.0: Release 1.60.0

Compare Source

Security

  • credentials/tls: if not set, set TLS MinVersion to 1.2 and CipherSuites according to supported suites not forbidden by RFC7540.
    • This is a behavior change to bring us into better alignment with RFC 7540.

API Changes

  • resolver: remove deprecated and experimental ClientConn.NewServiceConfig (#​6784)
  • client: remove deprecated grpc.WithServiceConfig DialOption (#​6800)

Bug Fixes

  • client: fix race that could cause a deadlock while entering idle mode and receiving a name resolver update (#​6804)
  • client: always enable TCP keepalives with OS defaults (#​6834)
  • credentials/alts: fix a bug preventing ALTS from connecting to the metadata server if the default scheme is overridden (#​6686)

Behavior Changes

  • server: Do not return from Stop() or GracefulStop() until all resources are released (#​6489)

Documentation

  • codes: clarify that only codes defined by this package are valid and that users should not cast other values to codes.Code (#​6701)

v1.59.0: Release 1.59.0

Compare Source

Behavior Changes

  • balancer: grpc will switch to case-sensitive balancer names soon; log a warning if a capital letter is encountered in an LB policy name (#​6647)
  • server: allow applications to send arbitrary data in the grpc-status-details-bin trailer (#​6662)
  • client: validate grpc-status-details-bin trailer and pass through the trailer to the application directly (#​6662)

New Features

  • tap (experimental): Add Header metadata to tap handler (#​6652)
  • grpc: channel idleness enabled by default with an idle_timeout of 30m (#​6585)

Documentation

  • examples: add an example of flow control behavior (#​6648)

Bug Fixes

  • xds: fix hash policy header to skip "-bin" headers and read content-type header as expected (#​6609)

v1.58.3

Compare Source

Security

  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.58.2: Release 1.58.2

Compare Source

Bug Fixes

  • balancer/weighted_round_robin: fix ticker leak on update

    A new ticker is created every time there is an update of addresses or configuration, but was not properly stopped. This change stops the ticker when it is no longer needed.

v1.58.1: Release 1.58.1

Compare Source

Bug Fixes
  • grpc: fix a bug that was decrementing active RPC count too early for streaming RPCs; leading to channel moving to IDLE even though it had open streams
  • grpc: fix a bug where transports were not being closed upon channel entering IDLE

v1.58.0: Release 1.58.0

Compare Source

API Changes

See #​6472 for details about these changes.

  • balancer: add StateListener to NewSubConnOptions for SubConn state updates and deprecate Balancer.UpdateSubConnState (#​6481)
    • UpdateSubConnState will be deleted in the future.
  • balancer: add SubConn.Shutdown and deprecate Balancer.RemoveSubConn (#​6493)
    • RemoveSubConn will be deleted in the future.
  • resolver: remove deprecated AddressType (#​6451)
    • This was previously used as a signal to enable the "grpclb" load balancing policy, and to pass LB addresses to the policy. Instead, balancer/grpclb/state.Set() should be used to add these addresses to the name resolver's output. The built-in "dns" name resolver already does this.
  • resolver: add new field Endpoints to State and deprecate Addresses (#​6471)
    • Addresses will be deleted in the future.

New Features

  • balancer/leastrequest: Add experimental support for least request LB policy and least request configured as a custom xDS policy (#​6510, #​6517)
    • Set GRPC_EXPERIMENTAL_ENABLE_LEAST_REQUEST=true to enable
  • stats: Add an RPC event for blocking caused by the LB policy's picker (#​6422)

Bug Fixes

  • clusterresolver: fix deadlock when dns resolver responds inline with update or error at build time (#​6563)
  • grpc: fix a bug where the channel could erroneously report TRANSIENT_FAILURE when actually moving to IDLE (#​6497)
  • balancergroup: do not cache closed sub-balancers by default; affects rls, weightedtarget and clustermanager LB policies (#​6523)
  • client: fix a bug that prevented detection of RPC status in trailers-only RPC responses when using ClientStream.Header(), and prevented retry of the RPC (#​6557)

Performance Improvements

  • client & server: Add experimental [With]SharedWriteBuffer to improve performance by reducing allocations when sending RPC messages. (Disabled by default.) (#​6309)

v1.57.2: Release 1.57.2

Compare Source

Bug Fixes

  • server: fix a bug introduced in v1.57.1 that causes connections to eventually stop processing any RPCs.

v1.57.1: Release 1.57.1

Compare Source

Security

  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.57.0: Release 1.57.0

Compare Source

API Changes

  • resolver: remove deprecated Target.Scheme and Target.Authority. Use URL.Scheme and URL.Host instead, respectively (#​6363)

Behavior Changes

  • client: percent-encode the default authority for the channel (#​6428)
  • xds: require EDS service name to be set in a CDS cluster with an 'xdstp' resource name (gRFC A47) (#​6438)

New Features

  • reflection: support the v1 reflection service and update Register to register both v1alpha and v1 (#​6329)
  • xds: add support for string matcher in RBAC header matching (#​6419)
  • alts: add support for GRPC_ALTS_MAX_CONCURRENT_HANDSHAKES env var (#​6267)
  • balancer/weightedroundrobin: de-experimentalize name of LB policy (#​6477)

Bug Fixes

  • status: status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil (#​6374)
  • server: fix bug preventing TCP user timeout from being set on the connection when TLS is used (#​6321)
  • client: eliminate connection churn during an address update that differs only in balancer attributes (#​6439)
  • clusterresolver: handle EDS nacks, resource-not-found errors, and DNS Resolver errors correctly (#​6436, #​6461)
  • xds/ringhash: cache connectivity state of subchannels inside picker to avoid rare races (#​6351)

v1.56.3: Release 1.56.3

Compare Source

Security

  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.56.2: Release 1.56.2

Compare Source

  • status: To fix a panic, status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil. (#​6374)

v1.56.1: Release 1.56.1

Compare Source

  • client: handle empty address lists correctly in addrConn.updateAddrs

v1.56.0: Release 1.56.0

Compare Source

New Features

  • client: support channel idleness using WithIdleTimeout dial option (#​6263)
    • This feature is currently disabled by default, but will be enabled with a 30 minute default in the future.
  • client: when using pickfirst, keep channel state in TRANSIENT_FAILURE until it becomes READY (gRFC A62) (#​6306)
  • xds: Add support for Custom LB Policies (gRFC A52) (#​6224)
  • xds: support pick_first Custom LB policy (gRFC A62) (#​6314) (#​6317)
  • client: add support for pickfirst address shuffling (gRFC A62) (#​6311)
  • xds: Add support for String Matcher Header Matcher in RDS (#​6313)
  • xds/outlierdetection: Add Channelz Logger to Outlier Detection LB (#​6145)
  • xds: enable RLS in xDS by default (#​6343)
  • orca: add support for application_utilization field and missing range checks on several metrics setters
  • balancer/weightedroundrobin: add new LB policy for balancing between backends based on their load reports (gRFC A58) (#​6241)
  • authz: add conversion of json to RBAC Audit Logging config (#​6192)
  • authz: add support for stdout logger (#​6230 and #​6298)
  • authz: support customizable audit functionality for authorization policy (#​6192 #​6230 #​6298 #​6158 #​6304 and #​6225)

Bug Fixes

  • orca: fix a race at startup of out-of-band metric subscriptions that would cause the report interval to request 0 (#​6245)
  • xds/xdsresource: Fix Outlier Detection Config Handling and correctly set xDS Defaults (#​6361)
  • xds/outlierdetection: Fix Outlier Detection Config Handling by setting defaults in ParseConfig() (#​6361)

API Changes

  • orca: allow a ServerMetricsProvider to be passed to the ORCA service and ServerOption (#​6223)

v1.55.1: Release 1.55.1

Compare Source

  • status: To fix a panic, status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil. (#​6374)

v1.55.0: Release 1.55.0

Compare Source

Behavior Changes

New Features

  • xds/xdsclient: support ignore_resource_deletion server feature as per gRFC A53 (#​6035)
  • security/advancedtls: add min/max TLS version selection options (#​6007)

Bug Fixes

  • xds: stop routing RPCs to deleted clusters (#​6125)
  • client: fix race between stream creation and GOAWAY receipt, which could lead to spurious UNAVAILABLE stream errors (#​6142)

Performance Improvements

v1.54.1: Release 1.54.1

Compare Source

Bug Fixes

  • credentials/alts: revert a change that causes a crash in the handshaker

v1.54.0: Release 1.54.0

Compare Source

Behavior Changes

  • xds: remove support for xDS v2 transport API (#​6013)

New Features

  • server: expose SetSendCompressor API to set send compressor name (#​5744)
  • xdsclient: include Node proto only in the first discovery request message, to improve performance (#​6078)

Bug Fixes

  • metadata: fix validation logic and properly validate metadata appended via AppendToOutgoingContext (#​6001)
  • transport: do not close connections when we encounter I/O errors until after all data is consumed (#​6110)
  • ringhash: ensure addresses are consistently hashed across updates (#​6066)
  • xds/clusterimpl: fix a bug causing unnecessary closing and re-opening of LRS streams (#​6112)
  • xds: NACK route configuration if sum of weights of weighted clusters exceeds uint32_max (#​6085)

Documentation

  • resolver: update Resolver.Scheme() docstring to mention requirement of lowercase scheme names (#​6014)
  • resolver: document expected error handling of UpdateState errors (#​6002)
  • examples: add example for ORCA load reporting (#​6114)
  • examples: add an example to illustrate authorization (authz) support (#​5920)

v1.53.0: Release 1.53.0

Compare Source

API Changes

  • balancer: support injection of per-call metadata from LB policies (#​5853)
  • resolver: remove deprecated field resolver.Target.Endpoint and replace with resolver.Target.Endpoint() (#​5852)

New Features

  • xds/ringhash: introduce GRPC_RING_HASH_CAP environment variable to override the maximum ring size. (#​5884)
  • rls: propagate headers received in RLS response to backends (#​5883)

Bug Fixes

  • transport: drain client transport when streamID approaches MaxStreamID (#​5889)
  • server: after GracefulStop, ensure connections are closed when final RPC completes (#​5968)
  • server: fix a few issues where grpc server uses RST_STREAM for non-HTTP/2 errors (#​5893)
  • xdsclient: fix race which can happen when multiple load reporting calls are made at the same time. (#​5927)
  • rls: fix a data race involving the LRU cache (#​5925)
  • xds: fix panic involving double close of channel in xDS transport (#​5959)
  • gcp/observability: update method name validation (#​5951)

Documentation

v1.52.3: Release 1.52.3

Compare Source

Bug Fixes

  • Fix user-agent version

v1.52.1: Release 1.52.1

Compare Source

Bug Fixes

  • grpclb: rename grpclbstate package back to state (#​5963)

v1.52.0: Release 1.52.0

Compare Source

New Features

  • xdsclient: log node ID with verbosity INFO (#​5860)
  • ringhash: impose cap on max_ring_size to reduce possibility of OOMs (#​5801)

Behavior Changes

  • client: return an error from Dial if an empty target is passed and no custom dialer is present; the ClientConn would otherwise be unable to connect and perform RPCs (#​5732)

Bug Fixes

  • transport (net/http server handler): respond to bad HTTP requests with status 400 (Bad Request) instead of 500 (Internal Server Error). (#​5804)
  • transport: Fixed closing a closed channel panic in handlePing (#​5854)
  • server: fix ChainUnaryInterceptor and ChainStreamInterceptor to allow retrying handlers (#​5666)
  • transport: ensure value of :authority header matches server name used in TLS handshake when the latter is overridden by the name resolver (#​5748)


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Contributor Author

renovate bot commented Jan 20, 2023

⚠ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: gwy/templates/go.mod.tmpl
Command failed: go get -d -t ./...
go: go.mod file not found in current directory or any parent directory.
	'go get' is no longer supported outside a module.
	To build and install a command, use 'go install' with a version,
	like 'go install example.com/cmd@latest'
	For more information, see https://golang.org/doc/go-get-install-deprecation
	or run 'go help get' or 'go help install'.

@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 7044b9c to ea7c399 Compare January 21, 2023 03:01
@renovate renovate bot changed the title fix(deps): update module google.golang.org/grpc to v1.52.0 fix(deps): update grpc version Jan 21, 2023
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 3 times, most recently from 525d574 to 8d9787c Compare February 8, 2023 17:07
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 2 times, most recently from 697f82d to 2bbca79 Compare February 20, 2023 21:54
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 2bbca79 to 1300e70 Compare March 31, 2023 21:26
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 2 times, most recently from 2622ae2 to f74e24d Compare April 17, 2023 04:58
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 2 times, most recently from 969ad02 to 1cd7637 Compare May 28, 2023 12:59
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 1cd7637 to 679483b Compare June 14, 2023 23:24
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 4 times, most recently from d539cfe to 63acc69 Compare July 1, 2023 19:44
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 4 times, most recently from 1fec07a to b3dc3f5 Compare July 11, 2023 03:28
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from b3dc3f5 to 0f54012 Compare July 16, 2023 22:54
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 0f54012 to 5c6d43a Compare July 25, 2023 14:43
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 3 times, most recently from 50612a4 to bf05eed Compare August 11, 2023 23:23
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from bf05eed to 8768410 Compare August 15, 2023 21:21
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 8768410 to b46ec5e Compare August 25, 2023 23:34
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 15fcae1 to 8a815e2 Compare April 19, 2024 01:41
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 8a815e2 to b88c284 Compare May 16, 2024 14:39
Copy link
Contributor Author

renovate bot commented May 16, 2024

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: gwy/templates/go.mod.tmpl
Command failed: go get -d -t ./...
go: go.mod file not found in current directory or any parent directory.
	'go get' is no longer supported outside a module.
	To build and install a command, use 'go install' with a version,
	like 'go install example.com/cmd@latest'
	For more information, see https://golang.org/doc/go-get-install-deprecation
	or run 'go help get' or 'go help install'.

@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 2 times, most recently from ba0ad8e to 61f2ffe Compare May 25, 2024 21:45
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 61f2ffe to 332aec0 Compare June 15, 2024 10:38
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 3 times, most recently from e5f13c5 to 4d242ac Compare July 15, 2024 10:59
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 4d242ac to c5caa46 Compare July 21, 2024 21:26
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from c5caa46 to 5fab29d Compare August 23, 2024 20:32
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 2 times, most recently from cd45d18 to 43a8758 Compare September 13, 2024 14:43
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 2 times, most recently from 404baee to f39f397 Compare September 21, 2024 19:52
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from f39f397 to d0115f9 Compare September 30, 2024 10:49
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 4 times, most recently from f2ea4ad to 1dfc193 Compare October 13, 2024 13:06
@renovate renovate bot changed the title fix(deps): update grpc version chore(deps): update grpc version Oct 26, 2024
@renovate renovate bot changed the title chore(deps): update grpc version fix(deps): update grpc version Oct 26, 2024
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from 1dfc193 to 4d64c19 Compare November 17, 2024 19:41
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch 3 times, most recently from 252942b to c2e5ec9 Compare December 15, 2024 06:11
@renovate renovate bot changed the title fix(deps): update grpc version chore(deps): update grpc version to v1.68 Dec 15, 2024
@renovate renovate bot changed the title chore(deps): update grpc version to v1.68 fix(deps): update grpc version Dec 16, 2024
@renovate renovate bot force-pushed the renovate/grpc-major-upgrade branch from c2e5ec9 to 921f53f Compare December 21, 2024 18:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants