Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update grpc packages to v1.34.0 #7407

Merged
merged 1 commit into from Dec 7, 2020

Conversation

renovate-bot
Copy link
Contributor

@renovate-bot renovate-bot commented Dec 1, 2020

WhiteSource Renovate

This PR contains the following updates:

Package Update Change
io.grpc:grpc-netty-shaded minor 1.33.1 -> 1.34.0
io.grpc:grpc-netty minor 1.33.1 -> 1.34.0
io.grpc:grpc-stub minor 1.33.1 -> 1.34.0
io.grpc:grpc-protobuf minor 1.33.1 -> 1.34.0

Release Notes

grpc/grpc-java

v1.34.0

Compare Source

gRPC Java 1.34.0 Release Notes

API Changes

  • api: added io.grpc.ForwardingServerBuilder (#​7633)

New Features

  • Added ChannelCredentials and ServerCredentials. They are safe for production but are Experimental APIs to resolve issues discovered as they see usage. The rationale and description of the new API can be found in gRFC L74. In short, these APIs are intended to “replace” the implicit security defaults of channels/servers as well as the usePlaintext() and useTransportSecurity() methods on the channel and server builders. The previous APIs are stable so will not be removed, but are expected to be deprecated in the future. Since these new APIs will be widely used, we encourage users to try the APIs out and report any problems experienced so they can be corrected before the APIs become stable (#​7294, #​7601)
  • As part of ChannelCredentials and ServerCredentials there are now XdsChannelCredentials and XdsServerCredentials added that can be used to enable use of XDS provided credentials on the channel and server. A File-watcher certificate provider has been implemented to support these Xds Credentials. The example in example-xds has been enhanced to be a full xDS example with XdsChannelCredentials and XdsServerCredentials to illustrate their usage. (#​7497, #​7636)
  • xds: added support for setting bootstrap file with java system property (#​7620)

Bug Fixes

  • netty: abrupt GOAWAY should not cause INTERNAL status. It is now UNAVAILABLE. This was a regression introduced in v1.33.0. The error was in the form StatusRuntimeException: INTERNAL: http2 exception with a cause similar to Http2Exception$StreamException: Cannot create stream 222691 greater than Last-Stream-ID 222689 from GOAWAY. This was mainly observed when a C core-based gRPC server shut down. (#​7501)
  • core, netty, okhttp, cronet: fixed builders ABI backward compatibility broken in v1.33.0 (#​7552). For details, see v1.33.1 release note.
  • core: round robin should ignore name resolution error for channel state change when there are READY subchannels (#​7595). Previously the round_robin load balancing policy puts the Channel into TRANSIENT_FAILURE if encountering name resolution failures even if it has received usable addresses.
  • core: fixed floating-point number formatting Locale in error messages (#​7473)
  • android: make Channel always enterIdle() upon network recover (#​7611). This is for AndroidChannelBuilder. It avoids failing new RPCs prematurely when the device detects the network has recovered while resuming connections.
  • xds: only reschedule time for unresolved resources upon ADS stream restarts (#​7582). The management server can choose not to send resources it has previously sent when the RPC stream is recreated. So the client will keep using resources it has saved previously.
  • alts: create handshaker RPC lazily (#​7630). Previously the handshake RPCs start before the TCP connection is established, which might be leaked forever if the connection is never established.

Documentation

  • api: added implementation note regarding server interceptors and thread locals (#​7482)
  • api: clarify expectations regarding ServerCall#close (#​7580)

Behavior Changes

  • netty: differentiate GOAWAY closure status descriptions (#​7502). Previously many different GOAWAY-related errors all produced the same status description. Now they each should use their own specific description which should allow distinguishing between issues like weak server GOAWAY behavior, MAX_CONCURRENT_STREAMS interfering with eager transport selection, and local races. We now also use UNAVAILABLE in more cases, although the cases that benefit should be rare
  • xds: added support case insensitive path matching (#​7506). The xDS traffic splitting now supports the case-insensitive option for path matching.
  • alts: add a timeout to AltsHandshakerStub. A default of 20 seconds is used (#​7589)

Dependencies

  • all: bumped google auth libraries to version 0.22.0 (#​6652)

Acknowledgements

@​attila123
@​erikjoh
@​jbdeboer
@​ST-DDT
@​sullis
@​susinmotion


Renovate configuration

📅 Schedule: At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

♻️ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by WhiteSource Renovate. View repository job log here.

@renovate-bot renovate-bot requested a review from a team as a code owner December 1, 2020 20:27
@trusted-contributions-gcf trusted-contributions-gcf bot added the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Dec 1, 2020
@google-cla google-cla bot added the cla: yes This human has signed the Contributor License Agreement. label Dec 1, 2020
@yoshi-kokoro yoshi-kokoro removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Dec 1, 2020
@chingor13 chingor13 merged commit 42f8e56 into googleapis:master Dec 7, 2020
@renovate-bot renovate-bot deleted the renovate/grpc-packages branch December 7, 2020 18:02
@ejona86
Copy link

ejona86 commented Dec 8, 2020

It may be best to revert this change, or hold off on releasing until you can bump to a 1.34.1. I'm currently investigating grpc/grpc-java#7643, but it appears 1.34.0 has bad credential handling that would impact direct path for some Google properties.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cla: yes This human has signed the Contributor License Agreement.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants