Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update module google.golang.org/grpc to v1.68.0 #92

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Nov 18, 2022

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
google.golang.org/grpc v1.50.1 -> v1.68.0 age adoption passing confidence

Release Notes

grpc/grpc-go (google.golang.org/grpc)

v1.68.0: Release 1.68.0

Compare Source

Behavior Changes

  • stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#​7740)
  • orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#​7663)
  • client: ClientConn.Close() now closes transports simultaneously and waits for transports to be closed before returning. (#​7666)
  • credentials: TLS credentials created via NewTLS that use tls.Config.GetConfigForClient will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using the GetConfigForClient option. (#​7709)

Bug Fixes

  • transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#​7662)
  • mem: reuse buffers more accurately by using slice capacity instead of length (#​7702)
  • status: Fix regression caused by #​6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1.

Dependencies

  • Bump minimum supported Go version to go1.22.7. (#​7624)

v1.67.1: Release 1.67.1

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.67.0: Release 1.67.0

Compare Source

Bug Fixes

  • ringhash: when used with multiple EDS priorities, fix bug that could prevent a higher priority from recovering from transient failure. (#​7364)

Behavior Changes

  • In accordance with RFC 7540, clients and servers will now reject TLS connections that don't support ALPN. This can be disabled by setting the environment variable GRPC_ENFORCE_ALPN_ENABLED to false (case insensitive). Please file a bug if you encounter any issues with this behavior. The environment variable to revert this behavior will be removed in an upcoming release. (#​7535)

v1.66.3: Release 1.66.3

Compare Source

Bug Fixes

  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.66.2: Release 1.66.2

Compare Source

Dependencies

  • Remove unintentional dependency on the testing package (#​7579)
  • Remove unintentional dependency on the flate package (#​7595)

Bug Fixes

  • client: fix a bug that prevented memory reuse after handling unary RPCs (#​7571)

v1.66.1

Compare Source

v1.66.0: Release 1.66.0

Compare Source

New Features

Bug Fixes

  • grpc: Clients now return status code INTERNAL instead of UNIMPLEMENTED when the server uses an unsupported compressor. This is consistent with the gRPC compression spec. (#​7461)
  • transport: Fix a bug which could result in writes busy looping when the underlying conn.Write returns errors (#​7394)
  • client: fix race that could lead to orphaned connections and associated resources. (#​7390)
  • xds: use locality from the connected address for load reporting with pick_first (#​7378)
    • without this fix, if a priority contains multiple localities with pick_first, load was reported for the wrong locality
  • client: prevent hanging during ClientConn.Close() when the network is unreachable (#​7540)

Performance Improvements

  • transport: double buffering is avoided when using an http connect proxy and the target server waits for client to send the first message. (#​7424)
  • codec: Implement a new Codec which uses buffer recycling for encoded message (#​7356)

v1.65.1: Release 1.65.1

Compare Source

Bug Fixes

v1.65.0: Release 1.65.0

Compare Source

Dependencies

  • Change support policy to cover only the latest TWO releases of Go, matching the policy for Go itself. See #​7249 for more information. (#​7250)
  • Update x/net/http2 to address CVE-2023-45288 (#​7282)

Behavior Changes

  • credentials/tls: clients and servers will now reject connections that don't support ALPN when environment variable GRPC_ENFORCE_ALPN_ENABLED is set to "true" (case insensitive). (#​7184)
    • NOTE: this behavior will become the default in a future release.
  • metadata: remove String method from MD to make printing more consistent (#​7373)

New Features

  • grpc: add WithMaxCallAttempts to configure gRPC's retry behavior per-channel. (#​7229)

Bug Fixes

  • ringhash: properly apply endpoint weights instead of ignoring them (#​7156)
  • xds: fix a bug that could cause xds-enabled servers to stop accepting new connections after handshaking errors (#​7128)

v1.64.1: Release 1.64.1

Compare Source

Dependencies

v1.64.0: Release 1.64.0

Compare Source

API Changes

  • stats: Deprecate InPayload.Data and OutPayload.Data; they were experimental and will be deleted in the next release (#​7121)

Behavior Changes

  • codec: Remove handling of environment variable GRPC_GO_ADVERTISE_COMPRESSORS to suppress setting supported compressors in grpc-accept-encoding header. Compressors will always be advertised, as they have been by default for some time (#​7203)

New Features

  • resolver/dns: Add SetMinResolutionInterval to set the minimum interval at which DNS re-resolutions may occur (#​6962)
  • peer/peer: Implement the fmt.Stringer interface for pretty printing Peer, and
  • metadata/metadata: Implement the fmt.Stringer interface for pretty printing MD (#​7137)

Performance Improvements

  • client: Improve RPC performance by reducing work while holding a lock (#​7132)

Bug Fixes

  • transport/server: Display the proper timeout value when keepalive pings are not ack'd in time (#​7038)
  • channelz: Fix bug that was causing the subchannel's target to be unset (#​7189)
  • stats: Fix bug where peer was not set in context when calling stats handler for OutPayload, InPayload, and End (#​7096)

Dependencies

  • deps: Remove dependency on deprecated github.com/golang/protobuf module (#​7122)

Documentation

  • grpc: Deprecate WithBlock, WithReturnConnectionError, FailOnNonTempDialError which are ignored by NewClient (#​7097)
  • grpc: Deprecate Dial and DialContext. These will continue to be supported throughout 1.x, but are deprecated to direct users to NewClient (See #​7090 for more information)
  • examples: Add custom lb example (#​6691)

v1.63.3: Release 1.63.3

Compare Source

Dependencies

v1.63.2: Release 1.63.2

Compare Source

Bugs

  • Fix the user agent string

v1.63.1: Release 1.63.1

Compare Source

  • grpc: un-deprecate Dial and DialContext and cherry-pick

v1.63.0: Release 1.63.0

Compare Source

Behavior Changes

  • grpc: Return canonical target string from resolver.Address.String() (experimental) (#​6923)
  • client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#​6983)

New Features

  • grpc: add ClientConn.CanonicalTarget() to return the canonical target string. (#​7006)
  • xds: implement LRS named metrics support (gRFC A64) (#​7027)
  • grpc: introduce grpc.NewClient to allow users to create new clients in idle mode and with "dns" as the default resolver (#​7010)

API Changes

  • grpc: stabilize experimental method ClientConn.Target() (#​7006)

Bug Fixes

  • xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#​7026)
  • server: Fix some errors returned by a server when using a grpc.Server as an http.Handler with the Go stdlib HTTP server (#​6989)
  • resolver/dns: add SetResolvingTimeout to allow configuring the DNS resolver's global timeout (#​6917)
  • Set the security level of Windows named pipes to NoSecurity (#​6956)

v1.62.2: Release 1.62.2

Compare Source

Dependencies

v1.62.1: Release 1.62.1

Compare Source

Bug Fixes

  • xds: fix a bug that results in no matching virtual host found RPC errors due to a difference between the target and LDS resource names (#​6997)
  • server: fixed stats handler data InPayload.Length for unary RPC calls (#​6766)
  • grpc: the experimental RecvBufferPool DialOption and ServerOption are now active during unary RPCs with compression (#​6766)
  • grpc: trim whitespaces in accept-encoding header before determining compressors

v1.62.0: Release 1.62.0

Compare Source

New Features

  • grpc: Add StaticMethod CallOption as a signal to stats handler that a method is safe to use as an instrument key (#​6986)

Behavior Changes

  • grpc: Return canonical target string from ClientConn.Target() and resolver.Address.String() (#​6923)

Bug Fixes

  • server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#​6977)

Performance Improvements

  • *: Allow building without x/net/trace by using grpcnotrace to enable dead code elimination (#​6954)
  • rand: improve performance and simplify implementation of grpcrand by adopting math/rand's top-level functions for go version 1.21.0 and newer. (#​6925)

Dependencies

  • *: Use google.golang.org/protobuf/proto instead of github.com/golang/protobuf. (#​6919)

[!NOTE]
The above change in proto library usage introduces a minor behavior change within those libraries. The old github.com/golang/protobuf library would error if given a nil message to Marshal, while the new google.golang.org/protobuf library will successfully output zero bytes in this case. This means server method handlers that did return nil, nil will now return an empty message and no error, while it used to return an error. This also affects the client side, where clients sending nil messages used to fail without sending the RPC, and now they will send an empty message.

v1.61.2: Release 1.61.2

Compare Source

Dependencies

v1.61.1: Release 1.61.1

Compare Source

Bug Fixes

  • server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#​6977)

v1.61.0: Release 1.61.0

Compare Source

New Features

  • resolver: provide method, AuthorityOverrider, to allow resolver.Builders to override the default authority for a ClientConn. (EXPERIMENTAL) (#​6752)
  • xds: add support for mTLS Credentials in xDS bootstrap (gRFC A65) (#​6757)
  • server: add grpc.WaitForHandlers ServerOption to cause Server.Stop to block until method handlers return. (EXPERIMENTAL) (#​6922)

Performance Improvements

Bug Fixes

  • client: correctly enable TCP keepalives with OS defaults on windows (#​6863)
  • server: change some stream operations to return UNAVAILABLE instead of UNKNOWN when underlying connection is broken (#​6891)
  • server: fix GracefulStop to block until all method handlers return (v1.60 regression). (#​6922)
  • server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (EXPERIMENTAL). (#​6856)
  • reflection: do not send invalid descriptors to clients for files that cannot be fully resolved (#​6771)
  • xds: don't fail channel/server startup when xds creds is specified, but bootstrap is missing certificate providers (#​6848)
  • xds: Atomically read and write xDS security configuration client side (#​6796)
  • xds/server: fix RDS handling for non-inline route configs (#​6915)

v1.60.1

Compare Source

Bug Fixes

  • server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (experimental feature).

v1.60.0: Release 1.60.0

Compare Source

Security

  • credentials/tls: if not set, set TLS MinVersion to 1.2 and CipherSuites according to supported suites not forbidden by RFC7540.
    • This is a behavior change to bring us into better alignment with RFC 7540.

API Changes

  • resolver: remove deprecated and experimental ClientConn.NewServiceConfig (#​6784)
  • client: remove deprecated grpc.WithServiceConfig DialOption (#​6800)

Bug Fixes

  • client: fix race that could cause a deadlock while entering idle mode and receiving a name resolver update (#​6804)
  • client: always enable TCP keepalives with OS defaults (#​6834)
  • credentials/alts: fix a bug preventing ALTS from connecting to the metadata server if the default scheme is overridden (#​6686)

Behavior Changes

  • server: Do not return from Stop() or GracefulStop() until all resources are released (#​6489)

Documentation

  • codes: clarify that only codes defined by this package are valid and that users should not cast other values to codes.Code (#​6701)

v1.59.0: Release 1.59.0

Compare Source

Behavior Changes

  • balancer: grpc will switch to case-sensitive balancer names soon; log a warning if a capital letter is encountered in an LB policy name (#​6647)
  • server: allow applications to send arbitrary data in the grpc-status-details-bin trailer (#​6662)
  • client: validate grpc-status-details-bin trailer and pass through the trailer to the application directly (#​6662)

New Features

  • tap (experimental): Add Header metadata to tap handler (#​6652)
  • grpc: channel idleness enabled by default with an idle_timeout of 30m (#​6585)

Documentation

  • examples: add an example of flow control behavior (#​6648)

Bug Fixes

  • xds: fix hash policy header to skip "-bin" headers and read content-type header as expected (#​6609)

v1.58.3

Compare Source

Security

  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.58.2: Release 1.58.2

Compare Source

Bug Fixes

  • balancer/weighted_round_robin: fix ticker leak on update

    A new ticker is created every time there is an update of addresses or configuration, but was not properly stopped. This change stops the ticker when it is no longer needed.

v1.58.1: Release 1.58.1

Compare Source

Bug Fixes
  • grpc: fix a bug that was decrementing active RPC count too early for streaming RPCs; leading to channel moving to IDLE even though it had open streams
  • grpc: fix a bug where transports were not being closed upon channel entering IDLE

v1.58.0: Release 1.58.0

Compare Source

API Changes

See #​6472 for details about these changes.

  • balancer: add StateListener to NewSubConnOptions for SubConn state updates and deprecate Balancer.UpdateSubConnState (#​6481)
    • UpdateSubConnState will be deleted in the future.
  • balancer: add SubConn.Shutdown and deprecate Balancer.RemoveSubConn (#​6493)
    • RemoveSubConn will be deleted in the future.
  • resolver: remove deprecated AddressType (#​6451)
    • This was previously used as a signal to enable the "grpclb" load balancing policy, and to pass LB addresses to the policy. Instead, balancer/grpclb/state.Set() should be used to add these addresses to the name resolver's output. The built-in "dns" name resolver already does this.
  • resolver: add new field Endpoints to State and deprecate Addresses (#​6471)
    • Addresses will be deleted in the future.

New Features

  • balancer/leastrequest: Add experimental support for least request LB policy and least request configured as a custom xDS policy (#​6510, #​6517)
    • Set GRPC_EXPERIMENTAL_ENABLE_LEAST_REQUEST=true to enable
  • stats: Add an RPC event for blocking caused by the LB policy's picker (#​6422)

Bug Fixes

  • clusterresolver: fix deadlock when dns resolver responds inline with update or error at build time (#​6563)
  • grpc: fix a bug where the channel could erroneously report TRANSIENT_FAILURE when actually moving to IDLE (#​6497)
  • balancergroup: do not cache closed sub-balancers by default; affects rls, weightedtarget and clustermanager LB policies (#​6523)
  • client: fix a bug that prevented detection of RPC status in trailers-only RPC responses when using ClientStream.Header(), and prevented retry of the RPC (#​6557)

Performance Improvements

  • client & server: Add experimental [With]SharedWriteBuffer to improve performance by reducing allocations when sending RPC messages. (Disabled by default.) (#​6309)

v1.57.2: Release 1.57.2

Compare Source

Bug Fixes

  • server: fix a bug introduced in v1.57.1 that causes connections to eventually stop processing any RPCs.

v1.57.1: Release 1.57.1

Compare Source

Security

  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.57.0: Release 1.57.0

Compare Source

API Changes

  • resolver: remove deprecated Target.Scheme and Target.Authority. Use URL.Scheme and URL.Host instead, respectively (#​6363)

Behavior Changes

  • client: percent-encode the default authority for the channel (#​6428)
  • xds: require EDS service name to be set in a CDS cluster with an 'xdstp' resource name (gRFC A47) (#​6438)

New Features

  • reflection: support the v1 reflection service and update Register to register both v1alpha and v1 (#​6329)
  • xds: add support for string matcher in RBAC header matching (#​6419)
  • alts: add support for GRPC_ALTS_MAX_CONCURRENT_HANDSHAKES env var (#​6267)
  • balancer/weightedroundrobin: de-experimentalize name of LB policy (#​6477)

Bug Fixes

  • status: status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil (#​6374)
  • server: fix bug preventing TCP user timeout from being set on the connection when TLS is used (#​6321)
  • client: eliminate connection churn during an address update that differs only in balancer attributes (#​6439)
  • clusterresolver: handle EDS nacks, resource-not-found errors, and DNS Resolver errors correctly (#​6436, #​6461)
  • xds/ringhash: cache connectivity state of subchannels inside picker to avoid rare races (#​6351)

v1.56.3: Release 1.56.3

Compare Source

Security

  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.56.2: Release 1.56.2

Compare Source

  • status: To fix a panic, status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil. (#​6374)

v1.56.1: Release 1.56.1

Compare Source

  • client: handle empty address lists correctly in addrConn.updateAddrs

v1.56.0: Release 1.56.0

Compare Source

New Features

  • client: support channel idleness using WithIdleTimeout dial option (#​6263)
    • This feature is currently disabled by default, but will be enabled with a 30 minute default in the future.
  • client: when using pickfirst, keep channel state in TRANSIENT_FAILURE until it becomes READY (gRFC A62) (#​6306)
  • xds: Add support for Custom LB Policies (gRFC A52) (#​6224)
  • xds: support pick_first Custom LB policy (gRFC A62) (#​6314) (#​6317)
  • client: add support for pickfirst address shuffling (gRFC A62) (#​6311)
  • xds: Add support for String Matcher Header Matcher in RDS (#​6313)
  • xds/outlierdetection: Add Channelz Logger to Outlier Detection LB (#​6145)
  • xds: enable RLS in xDS by default (#​6343)
  • orca: add support for application_utilization field and missing range checks on several metrics setters
  • balancer/weightedroundrobin: add new LB policy for balancing between backends based on their load reports (gRFC A58) (#​6241)
  • authz: add conversion of json to RBAC Audit Logging config (#​6192)
  • authz: add support for stdout logger (#​6230 and #​6298)
  • authz: support customizable audit functionality for authorization policy (#​6192 #​6230 #​6298 #​6158 #​6304 and #​6225)

Bug Fixes

  • orca: fix a race at startup of out-of-band metric subscriptions that would cause the report interval to request 0 (#​6245)
  • xds/xdsresource: Fix Outlier Detection Config Handling and correctly set xDS Defaults (#​6361)
  • xds/outlierdetection: Fix Outlier Detection Config Handling by setting defaults in ParseConfig() (#​6361)

API Changes

  • orca: allow a ServerMetricsProvider to be passed to the ORCA service and ServerOption (#​6223)

v1.55.1: Release 1.55.1

Compare Source

  • status: To fix a panic, status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil. (#​6374)

v1.55.0: Release 1.55.0

Compare Source

Behavior Changes

New Features

  • xds/xdsclient: support ignore_resource_deletion server feature as per gRFC A53 (#​6035)
  • security/advancedtls: add min/max TLS version selection options (#​6007)

Bug Fixes

  • xds: stop routing RPCs to deleted clusters (#​6125)
  • client: fix race between stream creation and GOAWAY receipt, which could lead to spurious UNAVAILABLE stream errors (#​6142)

Performance Improvements

v1.54.1: Release 1.54.1

Compare Source

Bug Fixes

  • credentials/alts: revert a change that causes a crash in the handshaker

v1.54.0: Release 1.54.0

Compare Source

Behavior Changes

  • xds: remove support for xDS v2 transport API (#​6013)

New Features

  • server: expose SetSendCompressor API to set send compressor name (#​5744)
  • xdsclient: include Node proto only in the first discovery request message, to improve performance (#​6078)

Bug Fixes

  • metadata: fix validation logic and properly validate metadata appended via AppendToOutgoingContext (#​6001)
  • transport: do not close connections when we encounter I/O errors until after all data is consumed (#​6110)
  • ringhash: ensure addresses are consistently hashed across updates (#​6066)
  • xds/clusterimpl: fix a bug causing unnecessary closing and re-opening of LRS streams (#​6112)
  • xds: NACK route configuration if sum of weights of weighted clusters exceeds uint32_max (#​6085)

Documentation

  • resolver: update Resolver.Scheme() docstring to mention requirement of lowercase scheme names (#​6014)
  • resolver: document expected error handling of UpdateState errors (#​6002)
  • examples: add example for ORCA load reporting (#​6114)
  • examples: add an example to illustrate authorization (authz) support (#​5920)

v1.53.0: Release 1.53.0

Compare Source

API Changes

  • balancer: support injection of per-call metadata from LB policies (#​5853)
  • resolver: remove deprecated field resolver.Target.Endpoint and replace with resolver.Target.Endpoint() (#​5852)

New Features

  • xds/ringhash: introduce GRPC_RING_HASH_CAP environment variable to override the maximum ring size. (#​5884)
  • rls: propagate headers received in RLS response to backends (#​5883)

Bug Fixes

  • transport: drain client transport when streamID approaches MaxStreamID (#​5889)
  • server: after GracefulStop, ensure connections are closed when final RPC completes (#​5968)
  • server: fix a few issues where grpc server uses RST_STREAM for non-HTTP/2 errors (#​5893)
  • xdsclient: fix race which can happen when multiple load reporting calls are made at the same time. (#​5927)
  • rls: fix a data race involving the LRU cache (#​5925)
  • xds: fix panic involving double close of channel in xDS transport (#​5959)
  • gcp/observability: update method name validation (#​5951)

Documentation

v1.52.3: Release 1.52.3

Compare Source

Bug Fixes

  • Fix user-agent version

v1.52.1: Release 1.52.1

Compare Source

Bug Fixes

  • grpclb: rename grpclbstate package back to state (#​5963)

v1.52.0: Release 1.52.0

Compare Source

New Features

  • xdsclient: log node ID with verbosity INFO (#​5860)
  • ringhash: impose cap on max_ring_size to reduce possibility of OOMs (#​5801)

Behavior Changes

  • client: return an error from Dial if an empty target is passed and no custom dialer is present; the ClientConn would otherwise be unable to connect and perform RPCs (#​5732)

Bug Fixes

  • transport (net/http server handler): respond to bad HTTP requests with status 400 (Bad Request) instead of 500 (Internal Server Error). (#​5804)
  • transport: Fixed closing a closed channel panic in handlePing (#​5854)
  • server: fix ChainUnaryInterceptor and ChainStreamInterceptor to allow retrying handlers (#​5666)
  • transport: ensure value of :authority header matches server name used in TLS handshake when the latter is overridden by the name resolver (#​5748)

Documentation

  • examples: add an example to illustrate the usage of stats handler (#​5657)
  • examples: add new example to show updating metadata in interceptors (#​5788)

v1.51.0: Release 1.51.0

Compare Source

Behavior Changes
  • xds: NACK EDS resources with duplicate addresses in accordance with a recent spec change (#​5715)
  • grpc: restrict status codes that can be generated by the control plane (gRFC A54) (#​5653)
New Features
  • client: set grpc-accept-encoding header with all registered compressors (#​5541)
  • xds/weightedtarget: return a more meaningful error when all child policies are in TRANSIENT_FAILURE (#​5711)
  • gcp/observability: add "started rpcs" metric (#​5768)
  • xds: de-experimentalize the google-c2p-resolver (#​5707)
  • balancer: add experimental Producer types and methods (#​5669)
  • orca: provide a way for LB policies to receive OOB load reports (#​5669)
Bug Fixes
  • go.mod: upgrade x/text dependency to address CVE 2022-32149 (#​5769)
  • client: fix race that could lead to an incorrect connection state if it was closed immediately after the server's HTTP/2 preface was received (#​5714)
  • xds: ensure sum of the weights of all EDS localities at the same priority level does not exceed uint32 max (#​5703)
  • client: fix binary logging bug which logs a server header on a trailers-only response (#​5763)
  • balancer/priority: fix a bug where unreleased references to removed child policies (and associated state) was causing a memory leak (#​5682)
  • xds/google-c2p: validate URI schema for no authorities (#​5756)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@cloudflare-workers-and-pages
Copy link

cloudflare-workers-and-pages bot commented Nov 18, 2022

Deploying lights with  Cloudflare Pages  Cloudflare Pages

Latest commit: 177ea3b
Status:🚫  Build failed.

View logs

@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.51.0 Update module google.golang.org/grpc to v1.52.0 Jan 11, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from ce81fa8 to 7f4aa58 Compare January 11, 2023 00:16
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.52.0 Update module google.golang.org/grpc to v1.53.0 Mar 9, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 7f4aa58 to c79f66a Compare March 9, 2023 23:18
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.53.0 Update module google.golang.org/grpc to v1.54.0 Mar 24, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from c79f66a to 415efdb Compare March 24, 2023 17:04
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.54.0 Update module google.golang.org/grpc to v1.55.0 Jun 1, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 415efdb to 9beca65 Compare June 1, 2023 03:47
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.55.0 Update module google.golang.org/grpc to v1.56.0 Jun 15, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 9beca65 to 54278f4 Compare June 15, 2023 20:37
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.56.0 Update module google.golang.org/grpc to v1.56.1 Jun 21, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 54278f4 to 8c97a6e Compare June 21, 2023 22:32
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.56.1 Update module google.golang.org/grpc to v1.56.2 Jul 6, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 8c97a6e to 2b17ad2 Compare July 6, 2023 20:28
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 2b17ad2 to 929273b Compare July 26, 2023 21:57
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.56.2 Update module google.golang.org/grpc to v1.57.0 Jul 26, 2023
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.57.0 Update module google.golang.org/grpc to v1.58.0 Sep 6, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 929273b to fbc3bff Compare September 6, 2023 22:54
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.58.0 Update module google.golang.org/grpc to v1.58.1 Sep 14, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from fbc3bff to 41f7808 Compare September 14, 2023 19:36
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.58.1 Update module google.golang.org/grpc to v1.58.2 Sep 22, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 41f7808 to 9f636bb Compare September 22, 2023 00:55
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.58.2 Update module google.golang.org/grpc to v1.58.3 Oct 10, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 9f636bb to 039b9ed Compare October 10, 2023 21:39
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.58.3 Update module google.golang.org/grpc to v1.59.0 Oct 17, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 039b9ed to fea778a Compare October 17, 2023 22:33
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from fea778a to 7bd2b63 Compare December 12, 2023 01:18
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.59.0 Update module google.golang.org/grpc to v1.60.0 Dec 12, 2023
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 7bd2b63 to f303c59 Compare December 19, 2023 01:26
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.61.0 Update module google.golang.org/grpc to v1.61.1 Feb 14, 2024
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.61.1 Update module google.golang.org/grpc to v1.62.0 Feb 22, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 453d397 to 9b8c49a Compare February 22, 2024 01:06
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 9b8c49a to ad3d9f5 Compare March 5, 2024 23:03
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.62.0 Update module google.golang.org/grpc to v1.62.1 Mar 5, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from ad3d9f5 to 95aec1f Compare April 3, 2024 21:23
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.62.1 Update module google.golang.org/grpc to v1.63.0 Apr 3, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 95aec1f to c9aa787 Compare April 8, 2024 22:44
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.63.0 Update module google.golang.org/grpc to v1.63.2 Apr 8, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from c9aa787 to 63d72b1 Compare May 15, 2024 04:19
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.63.2 Update module google.golang.org/grpc to v1.64.0 May 15, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 63d72b1 to a73dbe6 Compare July 2, 2024 19:20
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.64.0 Update module google.golang.org/grpc to v1.65.0 Jul 2, 2024
Copy link
Contributor Author

renovate bot commented Jul 2, 2024

ℹ Artifact update notice

File name: api/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 9 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.19 -> 1.23.3
google.golang.org/protobuf v1.28.1 -> v1.34.2
github.com/cespare/xxhash/v2 v2.1.1 -> v2.3.0
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b -> v1.2.2
github.com/golang/protobuf v1.5.2 -> v1.5.4
golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d -> v0.27.0
golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2 -> v0.29.0
golang.org/x/sync v0.0.0-20210220032951-036812b2e83c -> v0.8.0
golang.org/x/sys v0.0.0-20221010170243-090e33056c14 -> v0.25.0
golang.org/x/text v0.3.7 -> v0.18.0

@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from a73dbe6 to 13dac81 Compare August 28, 2024 12:11
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.65.0 Update module google.golang.org/grpc to v1.66.0 Aug 28, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 13dac81 to eba44fd Compare September 9, 2024 22:35
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.66.0 Update module google.golang.org/grpc to v1.66.1 Sep 9, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from eba44fd to 45f9f54 Compare September 10, 2024 14:02
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.66.1 Update module google.golang.org/grpc to v1.66.0 Sep 10, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 45f9f54 to a962711 Compare September 11, 2024 20:03
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.66.0 Update module google.golang.org/grpc to v1.66.2 Sep 11, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from a962711 to 3ebdeca Compare September 20, 2024 08:35
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.66.2 Update module google.golang.org/grpc to v1.67.0 Sep 20, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 3ebdeca to 9d69a07 Compare October 1, 2024 06:13
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.67.0 Update module google.golang.org/grpc to v1.67.1 Oct 1, 2024
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from 9d69a07 to a1eab68 Compare October 7, 2024 09:17
@renovate renovate bot force-pushed the renovate/google.golang.org-grpc-1.x branch from a1eab68 to 177ea3b Compare November 7, 2024 18:37
@renovate renovate bot changed the title Update module google.golang.org/grpc to v1.67.1 Update module google.golang.org/grpc to v1.68.0 Nov 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants