deps: update module google.golang.org/grpc to v1.63.2
This MR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
google.golang.org/grpc | require | minor |
v1.57.0 -> v1.63.2
|
Release Notes
grpc/grpc-go (google.golang.org/grpc)
v1.63.2
: Release 1.63.2
Bugs
- Fix the user agent string
v1.63.1
: Release 1.63.1
Bugs
- grpc: fixed subchannel log messages to properly reference the parent channel (#7101)
- Special thanks: @daniel-weisse
API Changes
- grpc: remove Deprecated tag from Dial and DialContext; these will be deprecated in v1.64 instead (#7103)
v1.63.0
: Release 1.63.0
Behavior Changes
- grpc: Return canonical target string from
resolver.Address.String()
(experimental) (#6923) - client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#6983)
- Special Thanks: @raghav-stripe
New Features
- grpc: add
ClientConn.CanonicalTarget()
to return the canonical target string. (#7006) - xds: implement LRS named metrics support (gRFC A64) (#7027)
- Special Thanks: @danielzhaotongliu
- grpc: introduce
grpc.NewClient
to allow users to create new clients in idle mode and with "dns" as the default resolver (#7010)- Special Thanks: @bruuuuuuuce
API Changes
- grpc: stabilize experimental method
ClientConn.Target()
(#7006)
Bug Fixes
- xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#7026)
- server: Fix some errors returned by a server when using a
grpc.Server
as anhttp.Handler
with the Go stdlib HTTP server (#6989) - resolver/dns: add
SetResolvingTimeout
to allow configuring the DNS resolver's global timeout (#6917)- Special Thanks: @and1truong
- Set the security level of Windows named pipes to NoSecurity (#6956)
- Special Thanks: @irsl
v1.62.2
: Release 1.62.2
Dependencies
- Update http2 library to address vulnerability CVE-2023-45288
v1.62.1
: Release 1.62.1
Bug Fixes
- xds: fix a bug that results in
no matching virtual host found
RPC errors due to a difference between the target and LDS resource names (#6997) - server: fixed stats handler data
InPayload.Length
for unary RPC calls (#6766)- Special Thanks: @hueypark
- grpc: the experimental
RecvBufferPool
DialOption
andServerOption
are now active during unary RPCs with compression (#6766)- Special Thanks: @hueypark
- grpc: trim whitespaces in
accept-encoding
header before determining compressors- Special Thanks: @sercand
v1.62.0
: Release 1.62.0
New Features
- grpc: Add StaticMethod CallOption as a signal to stats handler that a method is safe to use as an instrument key (#6986)
Behavior Changes
- grpc: Return canonical target string from ClientConn.Target() and resolver.Address.String() (#6923)
Bug Fixes
- server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#6977)
- Special Thanks: @s-matyukevich for discovering the root cause
Performance Improvements
- *: Allow building without
x/net/trace
by usinggrpcnotrace
to enable dead code elimination (#6954)- Special Thanks: @hugelgupf
- rand: improve performance and simplify implementation of
grpcrand
by adoptingmath/rand
's top-level functions for go version 1.21.0 and newer. (#6925)- Special Thanks: @kmirzavaziri
Dependencies
- *: Use google.golang.org/protobuf/proto instead of github.com/golang/protobuf. (#6919)
- Special Thanks: @Clement-Jean
[!NOTE] The above change in proto library usage introduces a minor behavior change within those libraries. The old
github.com/golang/protobuf
library would error if given anil
message toMarshal
, while the newgoogle.golang.org/protobuf
library will successfully output zero bytes in this case. This means server method handlers that didreturn nil, nil
will now return an empty message and no error, while it used to return an error. This also affects the client side, where clients sendingnil
messages used to fail without sending the RPC, and now they will send an empty message.
v1.61.2
: Release 1.61.2
Dependencies
- Update http2 library to address vulnerability CVE-2023-45288
v1.61.1
: Release 1.61.1
Bug Fixes
- server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#6977)
- Special Thanks: @s-matyukevich for discovering the root cause
v1.61.0
: Release 1.61.0
New Features
- resolver: provide method,
AuthorityOverrider
, to allow resolver.Builders to override the default authority for aClientConn
. (EXPERIMENTAL) (#6752)- Special Thanks: @Aditya-Sood
- xds: add support for mTLS Credentials in xDS bootstrap (gRFC A65) (#6757)
- Special Thanks: @atollena
- server: add
grpc.WaitForHandlers
ServerOption
to causeServer.Stop
to block until method handlers return. (EXPERIMENTAL) (#6922)
Performance Improvements
- grpc: skip compression of empty messages as an optimization (#6842)
- Special Thanks: @jroper
- orca: use atomic pointer to improve performance in server metrics recorder (#6799)
- Special Thanks: @danielzhaotongliu
Bug Fixes
- client: correctly enable TCP keepalives with OS defaults on windows (#6863)
- Special Thanks: @mmatczuk
- server: change some stream operations to return
UNAVAILABLE
instead ofUNKNOWN
when underlying connection is broken (#6891)- Special Thanks: @mustafasen81
- server: fix
GracefulStop
to block until all method handlers return (v1.60 regression). (#6922) - server: fix two bugs that could lead to panics at shutdown when using
NumStreamWorkers
(EXPERIMENTAL). (#6856) - reflection: do not send invalid descriptors to clients for files that cannot be fully resolved (#6771)
- Special Thanks: @jhump
- xds: don't fail channel/server startup when xds creds is specified, but bootstrap is missing certificate providers (#6848)
- xds: Atomically read and write xDS security configuration client side (#6796)
- xds/server: fix RDS handling for non-inline route configs (#6915)
v1.60.1
Bug Fixes
- server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (experimental feature).
v1.60.0
: Release 1.60.0
Security
- credentials/tls: if not set, set TLS MinVersion to 1.2 and CipherSuites according to supported suites not forbidden by RFC7540.
- This is a behavior change to bring us into better alignment with RFC 7540.
API Changes
- resolver: remove deprecated and experimental
ClientConn.NewServiceConfig
(#6784) - client: remove deprecated
grpc.WithServiceConfig
DialOption
(#6800)
Bug Fixes
- client: fix race that could cause a deadlock while entering idle mode and receiving a name resolver update (#6804)
- client: always enable TCP keepalives with OS defaults (#6834)
- credentials/alts: fix a bug preventing ALTS from connecting to the metadata server if the default scheme is overridden (#6686)
- Special Thanks: @mjamaloney
Behavior Changes
- server: Do not return from Stop() or GracefulStop() until all resources are released (#6489)
- Special Thanks: @fho
Documentation
- codes: clarify that only codes defined by this package are valid and that users should not cast other values to
codes.Code
(#6701)
v1.59.0
: Release 1.59.0
Behavior Changes
- balancer: grpc will switch to case-sensitive balancer names soon; log a warning if a capital letter is encountered in an LB policy name (#6647)
- server: allow applications to send arbitrary data in the
grpc-status-details-bin
trailer (#6662) - client: validate
grpc-status-details-bin
trailer and pass through the trailer to the application directly (#6662)
New Features
- tap (experimental): Add Header metadata to tap handler (#6652)
- Special Thanks: @pstibrany
- grpc: channel idleness enabled by default with an
idle_timeout
of30m
(#6585)
Documentation
- examples: add an example of flow control behavior (#6648)
Bug Fixes
- xds: fix hash policy header to skip "-bin" headers and read content-type header as expected (#6609)
v1.58.3
: Release 1.58.3
Security
-
server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)
In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.
v1.58.2
: Release 1.58.2
Bug Fixes
-
balancer/weighted_round_robin: fix ticker leak on update
A new ticker is created every time there is an update of addresses or configuration, but was not properly stopped. This change stops the ticker when it is no longer needed.
v1.58.1
: Release 1.58.1
Bug Fixes
- grpc: fix a bug that was decrementing active RPC count too early for streaming RPCs; leading to channel moving to IDLE even though it had open streams
- grpc: fix a bug where transports were not being closed upon channel entering IDLE
v1.58.0
: Release 1.58.0
API Changes
See #6472 for details about these changes.
- balancer: add
StateListener
toNewSubConnOptions
forSubConn
state updates and deprecateBalancer.UpdateSubConnState
(#6481)-
UpdateSubConnState
will be deleted in the future.
-
- balancer: add
SubConn.Shutdown
and deprecateBalancer.RemoveSubConn
(#6493)-
RemoveSubConn
will be deleted in the future.
-
- resolver: remove deprecated
AddressType
(#6451)- This was previously used as a signal to enable the "grpclb" load balancing policy, and to pass LB addresses to the policy. Instead,
balancer/grpclb/state.Set()
should be used to add these addresses to the name resolver's output. The built-in "dns" name resolver already does this.
- This was previously used as a signal to enable the "grpclb" load balancing policy, and to pass LB addresses to the policy. Instead,
- resolver: add new field
Endpoints
toState
and deprecateAddresses
(#6471)-
Addresses
will be deleted in the future.
-
New Features
- balancer/leastrequest: Add experimental support for least request LB policy and least request configured as a custom xDS policy (#6510, #6517)
- Set
GRPC_EXPERIMENTAL_ENABLE_LEAST_REQUEST=true
to enable
- Set
- stats: Add an RPC event for blocking caused by the LB policy's picker (#6422)
Bug Fixes
- clusterresolver: fix deadlock when dns resolver responds inline with update or error at build time (#6563)
- grpc: fix a bug where the channel could erroneously report
TRANSIENT_FAILURE
when actually moving toIDLE
(#6497) - balancergroup: do not cache closed sub-balancers by default; affects
rls
,weightedtarget
andclustermanager
LB policies (#6523) - client: fix a bug that prevented detection of RPC status in trailers-only RPC responses when using
ClientStream.Header()
, and prevented retry of the RPC (#6557)
Performance Improvements
- client & server: Add experimental
[With]SharedWriteBuffer
to improve performance by reducing allocations when sending RPC messages. (Disabled by default.) (#6309)- Special Thanks: @s-matyukevich
v1.57.2
: Release 1.57.2
Bug Fixes
- server: fix a bug introduced in v1.57.1 that causes connections to eventually stop processing any RPCs.
v1.57.1
: Release 1.57.1
Security
-
server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)
In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.
-
If you want to rebase/retry this MR, check this box