Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update module google.golang.org/grpc to v1.71.0 #77

Open
wants to merge 1 commit into
base: release-4.15
Choose a base branch
from

Conversation

red-hat-konflux[bot]
Copy link

This PR contains the following updates:

Package Type Update Change
google.golang.org/grpc require minor v1.56.3 -> v1.71.0

Release Notes

grpc/grpc-go (google.golang.org/grpc)

v1.71.0: Release 1.71.0

Compare Source

API Changes
  • balancer: Custom LB policies that record metrics must use the new MetricsRecorder method on Balancer.ClientConn instead of the removed Balancer.BuildOptions.MetricsRecorder field to obtain a metrics recorder. (#​8027)
  • balancer: balancer.ClientConn implementations must now embed a delegate implementation. This allows grpc-go to add new methods to the interface and remain backward compatible. (#​8026)
  • balancer/endpointsharding: The constructor accepts the child balancer's builder and a struct with optional configuration. (#​8052)
New Features
  • xds: Add support for dualstack via the additional_addresses field in the Endpoint resource. To disable this feature, set the environment variable GRPC_EXPERIMENTAL_XDS_DUALSTACK_ENDPOINTS=false. (#​8134)
  • stats/opentelemetry: Add experimental support for OpenTelemetry tracing. (#​7852)
  • xds/internal/xdsclient: Add counter metrics for valid and invalid resource updates. (#​8038)
  • balancer/leastrequest, roundrobin: Add dualstack support. (#​7969, #​7966)
  • balancer/endpointsharding: Balancers created with the new DisableAutoReconnect option will not attempt to call ExitIdle automatically on their children when the children report idle. (#​8052)
Bug Fixes
  • client: Fix support for proxies when using grpc.NewClient so the target is resolved by the proxy as expected. (#​7881)
    • Added WithLocalDNSResolution() dial option to explicitly force target resolution on the client instead. (#​7881)
  • weightedtarget: Return erroring picker when no targets are configured. (#​8070)
  • xds: Fail RPCs with UNAVAILABLE when the EDS resource is missing or contains no endpoints (#​8070)
  • xdsclient: Fix a bug where connectivity failures were reported to resource watchers before trying all listed servers. (#​8075)
  • grpc: Fix the number of bytes reported in the error message when encoded messages are larger than 4GB. (#​8033)
  • xds: Fixed a bug preventing tests from creating multiple servers or channels with different bootstrap configs. (#​8050)
  • grpc: Fix message length checks when compression is enabled and maxReceiveMessageSize is MaxInt (#​7918)
Documentation
  • client: Improve documentation of grpc.NewClient and ClientConn.CanonicalTarget by providing examples. (#​8078)
  • examples/features/dualstack: New example demonstrating usage of endpoints and dualstack functionality. (#​8098)

v1.70.0: Release 1.70.0

Compare Source

Behavior Changes
  • client: reject service configs containing an invalid retryPolicy in accordance with gRFCs A21 and A6. (#​7905)
    • Note that this is a potential breaking change for some users using an invalid configuration, but continuing to allow this behavior would violate our cross-language compatibility requirements.
New Features
  • xdsclient: fallback to a secondary management server (if specified in the bootstrap configuration) when the primary is down is enabled by default. Can be disabled by setting the environment variable GRPC_EXPERIMENTAL_XDS_FALLBACK to false. (#​7949)
  • experimental/credentials: experimental transport credentials are added which don't enforce ALPN. (#​7980)
    • These credentials will be removed in an upcoming grpc-go release. Users must not rely on these credentials directly. Instead, they should either vendor a specific version of gRPC or copy the relevant credentials into their own codebase if absolutely necessary.
Bug Fixes
  • xds: fix a possible deadlock that happens when both the client application and the xDS management server (responsible for configuring the client) are using the xds:/// scheme in their target URIs. (#​8011)
Performance
  • server: for unary requests, free raw request message data as soon as parsing is finished instead of waiting until the method handler returns. (#​7998)
Documentation
  • examples/features/gracefulstop: add example to demonstrate server graceful stop. (#​7865)

v1.69.4: Release 1.69.4

Compare Source

Bug Fixes
  • rbac: fix support for :path header matchers, which would previously never successfully match (#​7965).
Documentation
  • examples/features/csm_observability: update example client and server to use the helloworld service instead of echo service (#​7945).

v1.69.2: Release 1.69.2

Compare Source

Bug Fixes
  • stats/experimental: add type aliases for symbols (Metrics/etc) that were moved to the stats package (#​7929).
  • client: set user-agent string to the correct version.

v1.69.0: Release 1.69.0

Compare Source

Known Issues
  • The recently added grpc.NewClient function is incompatible with forward proxies, because it resolves the target hostname on the client instead of passing the hostname to the proxy. A fix is expected to be a part of grpc-go v1.70. (#​7556)
New Features
  • stats/opentelemetry: Introduce new APIs to enable OpenTelemetry instrumentation for metrics on servers and clients (#​7874)
  • xdsclient: add support to fallback to lower priority servers when higher priority ones are down (#​7701)
  • dns: Add support for link local IPv6 addresses (#​7889)
  • The new experimental pickfirst LB policy (disabled by default) supports Happy Eyeballs, interleaving IPv4 and IPv6 address as described in RFC-8305 section 4, to attempt connections to multiple backends concurrently. The experimental pickfirst policy can be enabled by setting the environment variable GRPC_EXPERIMENTAL_ENABLE_NEW_PICK_FIRST to true. (#​7725, #​7742)
  • balancer/pickfirst: Emit metrics from the pick_first load balancing policy (#​7839)
  • grpc: export MethodHandler, which is the type of an already-exported field in MethodDesc (#​7796)
Bug Fixes
  • credentials/google: set scope for application default credentials (#​7887)
  • xds: fix edge-case issues where some clients or servers would not initialize correctly or would not receive errors when resources are invalid or unavailable if another channel or server with the same target was already in use . (#​7851, #​7853)
  • examples: fix the debugging example, which was broken by a recent change (#​7833)
Behavior Changes
  • client: update retry attempt backoff to apply jitter per updates to gRFC A6. (#​7869)
  • balancer/weightedroundrobin: use the pick_first LB policy to manage connections (#​7826)
API Changes
  • balancer: An internal method is added to the balancer.SubConn interface to force implementors to embed a delegate implementation. This requirement is present in the interface documentation, but wasn't enforced earlier. (#​7840)
Performance Improvements
  • mem: implement a ReadAll() method for more efficient io.Reader consumption (#​7653)
  • mem: use slice capacity instead of length to determine whether to pool buffers or directly allocate them (#​7702)
Documentation
  • examples/csm_observability: Add xDS Credentials and switch server to be xDS enabled (#​7875)

v1.68.2: Release 1.68.2

Compare Source

Dependencies
  • Remove the experimental stats/opentelemetry module and instead add the experimental packages it contains directly into the main google.golang.org/grpc module (#​7936)

v1.68.1: Release 1.68.1

Compare Source

Bug Fixes
  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#​7861)
Dependencies
  • Relax minimum Go version requirement from go1.22.7 to go1.22. (#​7831)

v1.68.0: Release 1.68.0

Compare Source

Known Issues
  • The recently added grpc.NewClient function is incompatible with forward proxies, because it resolves the target hostname on the client instead of passing the hostname to the proxy. This bug has been present since the introduction of NewClient. A fix is expected to be a part of grpc-go v1.70. (#​7556)

Behavior Changes
  • stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#​7740)
  • orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#​7663)
  • client: ClientConn.Close() now closes transports simultaneously and waits for transports to be closed before returning. (#​7666)
  • credentials: TLS credentials created via NewTLS that use tls.Config.GetConfigForClient will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using the GetConfigForClient option. (#​7709)
Bug Fixes
  • transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#​7662)
  • mem: reuse buffers more accurately by using slice capacity instead of length (#​7702)
  • status: Fix regression caused by #​6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1. (#​7724)
Dependencies
  • Bump minimum supported Go version to go1.22.7. (#​7624)

v1.67.3: Release 1.67.3

Compare Source

Dependencies
  • Remove the experimental stats/opentelemetry module and instead add the experimental packages it contains directly into the main google.golang.org/grpc module (#​7935)

v1.67.2: Release 1.67.2

Compare Source

Bug Fixes
  • credentials/alts: avoid SRV and TXT lookups for handshaker service to work around hangs caused by buggy versions of systemd-resolved. (#​7861)

v1.67.1: Release 1.67.1

Compare Source

Bug Fixes
  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.67.0: Release 1.67.0

Compare Source

Bug Fixes
  • ringhash: when used with multiple EDS priorities, fix bug that could prevent a higher priority from recovering from transient failure. (#​7364)
Behavior Changes
  • In accordance with RFC 7540, clients and servers will now reject TLS connections that don't support ALPN. This can be disabled by setting the environment variable GRPC_ENFORCE_ALPN_ENABLED to false (case insensitive). Please file a bug if you encounter any issues with this behavior. The environment variable to revert this behavior will be removed in an upcoming release. (#​7535)

v1.66.3: Release 1.66.3

Compare Source

Bug Fixes
  • transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#​7667)
  • xds/server: Fix xDS Server memory leak. (#​7681)

v1.66.2: Release 1.66.2

Compare Source

Dependencies
  • Remove unintentional dependency on the testing package (#​7579)
  • Remove unintentional dependency on the flate package (#​7595)
Bug Fixes
  • client: fix a bug that prevented memory reuse after handling unary RPCs (#​7571)

v1.66.1

Compare Source

v1.66.0: Release 1.66.0

Compare Source

New Features
Bug Fixes
  • grpc: Clients now return status code INTERNAL instead of UNIMPLEMENTED when the server uses an unsupported compressor. This is consistent with the gRPC compression spec. (#​7461)
  • transport: Fix a bug which could result in writes busy looping when the underlying conn.Write returns errors (#​7394)
  • client: fix race that could lead to orphaned connections and associated resources. (#​7390)
  • xds: use locality from the connected address for load reporting with pick_first (#​7378)
    • without this fix, if a priority contains multiple localities with pick_first, load was reported for the wrong locality
  • client: prevent hanging during ClientConn.Close() when the network is unreachable (#​7540)
Performance Improvements
  • transport: double buffering is avoided when using an http connect proxy and the target server waits for client to send the first message. (#​7424)
  • codec: Implement a new Codec which uses buffer recycling for encoded message (#​7356)

v1.65.1: Release 1.65.1

Compare Source

Bug Fixes

v1.65.0: Release 1.65.0

Compare Source

Dependencies
  • Change support policy to cover only the latest TWO releases of Go, matching the policy for Go itself. See #​7249 for more information. (#​7250)
  • Update x/net/http2 to address CVE-2023-45288 (#​7282)
Behavior Changes
  • credentials/tls: clients and servers will now reject connections that don't support ALPN when environment variable GRPC_ENFORCE_ALPN_ENABLED is set to "true" (case insensitive). (#​7184)
    • NOTE: this behavior will become the default in a future release.
  • metadata: remove String method from MD to make printing more consistent (#​7373)
New Features
  • grpc: add WithMaxCallAttempts to configure gRPC's retry behavior per-channel. (#​7229)
Bug Fixes
  • ringhash: properly apply endpoint weights instead of ignoring them (#​7156)
  • xds: fix a bug that could cause xds-enabled servers to stop accepting new connections after handshaking errors (#​7128)

v1.64.1: Release 1.64.1

Compare Source

Dependencies

v1.64.0: Release 1.64.0

Compare Source

API Changes
  • stats: Deprecate InPayload.Data and OutPayload.Data; they were experimental and will be deleted in the next release (#​7121)
Behavior Changes
  • codec: Remove handling of environment variable GRPC_GO_ADVERTISE_COMPRESSORS to suppress setting supported compressors in grpc-accept-encoding header. Compressors will always be advertised, as they have been by default for some time (#​7203)
New Features
  • resolver/dns: Add SetMinResolutionInterval to set the minimum interval at which DNS re-resolutions may occur (#​6962)
  • peer/peer: Implement the fmt.Stringer interface for pretty printing Peer, and
  • metadata/metadata: Implement the fmt.Stringer interface for pretty printing MD (#​7137)
Performance Improvements
  • client: Improve RPC performance by reducing work while holding a lock (#​7132)
Bug Fixes
  • transport/server: Display the proper timeout value when keepalive pings are not ack'd in time (#​7038)
  • channelz: Fix bug that was causing the subchannel's target to be unset (#​7189)
  • stats: Fix bug where peer was not set in context when calling stats handler for OutPayload, InPayload, and End (#​7096)
Dependencies
  • deps: Remove dependency on deprecated github.com/golang/protobuf module (#​7122)
Documentation
  • grpc: Deprecate WithBlock, WithReturnConnectionError, FailOnNonTempDialError which are ignored by NewClient (#​7097)
  • grpc: Deprecate Dial and DialContext. These will continue to be supported throughout 1.x, but are deprecated to direct users to NewClient (See #​7090 for more information)
  • examples: Add custom lb example (#​6691)

v1.63.3: Release 1.63.3

Compare Source

Dependencies

v1.63.2: Release 1.63.2

Compare Source

Bugs
  • Fix the user agent string

v1.63.1: Release 1.63.1

Compare Source

Bugs
API Changes
  • grpc: remove Deprecated tag from Dial and DialContext; these will be deprecated in v1.64 instead (#​7103)

v1.63.0: Release 1.63.0

Compare Source

Behavior Changes
  • grpc: Return canonical target string from resolver.Address.String() (experimental) (#​6923)
  • client & server: when using write buffer pooling, use input value for buffer size instead of size*2 (#​6983)
New Features
  • grpc: add ClientConn.CanonicalTarget() to return the canonical target string. (#​7006)
  • xds: implement LRS named metrics support (gRFC A64) (#​7027)
  • grpc: introduce grpc.NewClient to allow users to create new clients in idle mode and with "dns" as the default resolver (#​7010)
API Changes
  • grpc: stabilize experimental method ClientConn.Target() (#​7006)
Bug Fixes
  • xds: fix an issue that would cause the client to send an empty list of resources for LDS/CDS upon reconnecting with the management server (#​7026)
  • server: Fix some errors returned by a server when using a grpc.Server as an http.Handler with the Go stdlib HTTP server (#​6989)
  • resolver/dns: add SetResolvingTimeout to allow configuring the DNS resolver's global timeout (#​6917)
  • Set the security level of Windows named pipes to NoSecurity (#​6956)

v1.62.2: Release 1.62.2

Compare Source

Dependencies

v1.62.1: Release 1.62.1

Compare Source

Bug Fixes
  • xds: fix a bug that results in no matching virtual host found RPC errors due to a difference between the target and LDS resource names (#​6997)
  • server: fixed stats handler data InPayload.Length for unary RPC calls (#​6766)
  • grpc: the experimental RecvBufferPool DialOption and ServerOption are now active during unary RPCs with compression (#​6766)
  • grpc: trim whitespaces in accept-encoding header before determining compressors

v1.62.0: Release 1.62.0

Compare Source

New Features
  • grpc: Add StaticMethod CallOption as a signal to stats handler that a method is safe to use as an instrument key (#​6986)
Behavior Changes
  • grpc: Return canonical target string from ClientConn.Target() and resolver.Address.String() (#​6923)
Bug Fixes
  • server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#​6977)
Performance Improvements
  • *: Allow building without x/net/trace by using grpcnotrace to enable dead code elimination (#​6954)
  • rand: improve performance and simplify implementation of grpcrand by adopting math/rand's top-level functions for go version 1.21.0 and newer. (#​6925)
Dependencies
  • *: Use google.golang.org/protobuf/proto instead of github.com/golang/protobuf. (#​6919)

[!NOTE]
The above change in proto library usage introduces a minor behavior change within those libraries. The old github.com/golang/protobuf library would error if given a nil message to Marshal, while the new google.golang.org/protobuf library will successfully output zero bytes in this case. This means server method handlers that did return nil, nil will now return an empty message and no error, while it used to return an error. This also affects the client side, where clients sending nil messages used to fail without sending the RPC, and now they will send an empty message.

v1.61.2: Release 1.61.2

Compare Source

Dependencies

v1.61.1: Release 1.61.1

Compare Source

Bug Fixes
  • server: wait to close connection until incoming socket is drained (with timeout) to prevent data loss on client-side (#​6977)

v1.61.0: Release 1.61.0

Compare Source

New Features
  • resolver: provide method, AuthorityOverrider, to allow resolver.Builders to override the default authority for a ClientConn. (EXPERIMENTAL) (#​6752)
  • xds: add support for mTLS Credentials in xDS bootstrap (gRFC A65) (#​6757)
  • server: add grpc.WaitForHandlers ServerOption to cause Server.Stop to block until method handlers return. (EXPERIMENTAL) (#​6922)
Performance Improvements
Bug Fixes
  • client: correctly enable TCP keepalives with OS defaults on windows (#​6863)
  • server: change some stream operations to return UNAVAILABLE instead of UNKNOWN when underlying connection is broken (#​6891)
  • server: fix GracefulStop to block until all method handlers return (v1.60 regression). (#​6922)
  • server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (EXPERIMENTAL). (#​6856)
  • reflection: do not send invalid descriptors to clients for files that cannot be fully resolved (#​6771)
  • xds: don't fail channel/server startup when xds creds is specified, but bootstrap is missing certificate providers (#​6848)
  • xds: Atomically read and write xDS security configuration client side (#​6796)
  • xds/server: fix RDS handling for non-inline route configs (#​6915)

v1.60.1

Compare Source

Bug Fixes
  • server: fix two bugs that could lead to panics at shutdown when using NumStreamWorkers (experimental feature).

v1.60.0: Release 1.60.0

Compare Source

Security
  • credentials/tls: if not set, set TLS MinVersion to 1.2 and CipherSuites according to supported suites not forbidden by RFC7540.
    • This is a behavior change to bring us into better alignment with RFC 7540.
API Changes
  • resolver: remove deprecated and experimental ClientConn.NewServiceConfig (#​6784)
  • client: remove deprecated grpc.WithServiceConfig DialOption (#​6800)
Bug Fixes
  • client: fix race that could cause a deadlock while entering idle mode and receiving a name resolver update (#​6804)
  • client: always enable TCP keepalives with OS defaults (#​6834)
  • credentials/alts: fix a bug preventing ALTS from connecting to the metadata server if the default scheme is overridden (#​6686)
Behavior Changes
  • server: Do not return from Stop() or GracefulStop() until all resources are released (#​6489)
Documentation
  • codes: clarify that only codes defined by this package are valid and that users should not cast other values to codes.Code (#​6701)

v1.59.0: Release 1.59.0

Compare Source

Behavior Changes
  • balancer: grpc will switch to case-sensitive balancer names soon; log a warning if a capital letter is encountered in an LB policy name (#​6647)
  • server: allow applications to send arbitrary data in the grpc-status-details-bin trailer (#​6662)
  • client: validate grpc-status-details-bin trailer and pass through the trailer to the application directly (#​6662)
New Features
  • tap (experimental): Add Header metadata to tap handler (#​6652)
  • grpc: channel idleness enabled by default with an idle_timeout of 30m (#​6585)
Documentation
  • examples: add an example of flow control behavior (#​6648)
Bug Fixes
  • xds: fix hash policy header to skip "-bin" headers and read content-type header as expected (#​6609)

v1.58.3: Release 1.58.3

Compare Source

Security
  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.58.2: Release 1.58.2

Compare Source

Bug Fixes
  • balancer/weighted_round_robin: fix ticker leak on update

    A new ticker is created every time there is an update of addresses or configuration, but was not properly stopped. This change stops the ticker when it is no longer needed.

v1.58.1: Release 1.58.1

Compare Source

Bug Fixes
  • grpc: fix a bug that was decrementing active RPC count too early for streaming RPCs; leading to channel moving to IDLE even though it had open streams
  • grpc: fix a bug where transports were not being closed upon channel entering IDLE

v1.58.0: Release 1.58.0

Compare Source

API Changes

See #​6472 for details about these changes.

  • balancer: add StateListener to NewSubConnOptions for SubConn state updates and deprecate Balancer.UpdateSubConnState (#​6481)
    • UpdateSubConnState will be deleted in the future.
  • balancer: add SubConn.Shutdown and deprecate Balancer.RemoveSubConn (#​6493)
    • RemoveSubConn will be deleted in the future.
  • resolver: remove deprecated AddressType (#​6451)
    • This was previously used as a signal to enable the "grpclb" load balancing policy, and to pass LB addresses to the policy. Instead, balancer/grpclb/state.Set() should be used to add these addresses to the name resolver's output. The built-in "dns" name resolver already does this.
  • resolver: add new field Endpoints to State and deprecate Addresses (#​6471)
    • Addresses will be deleted in the future.
New Features
  • balancer/leastrequest: Add experimental support for least request LB policy and least request configured as a custom xDS policy (#​6510, #​6517)
    • Set GRPC_EXPERIMENTAL_ENABLE_LEAST_REQUEST=true to enable
  • stats: Add an RPC event for blocking caused by the LB policy's picker (#​6422)
Bug Fixes
  • clusterresolver: fix deadlock when dns resolver responds inline with update or error at build time (#​6563)
  • grpc: fix a bug where the channel could erroneously report TRANSIENT_FAILURE when actually moving to IDLE (#​6497)
  • balancergroup: do not cache closed sub-balancers by default; affects rls, weightedtarget and clustermanager LB policies (#​6523)
  • client: fix a bug that prevented detection of RPC status in trailers-only RPC responses when using ClientStream.Header(), and prevented retry of the RPC (#​6557)
Performance Improvements
  • client & server: Add experimental [With]SharedWriteBuffer to improve performance by reducing allocations when sending RPC messages. (Disabled by default.) (#​6309)

v1.57.2: Release 1.57.2

Compare Source

Bug Fixes
  • server: fix a bug introduced in v1.57.1 that causes connections to eventually stop processing any RPCs.

v1.57.1: Release 1.57.1

Compare Source

Security
  • server: prohibit more than MaxConcurrentStreams handlers from running at once (CVE-2023-44487)

    In addition to this change, applications should ensure they do not leave running tasks behind related to the RPC before returning from method handlers, or should enforce appropriate limits on any such work.

v1.57.0: Release 1.57.0

Compare Source

API Changes
  • resolver: remove deprecated Target.Scheme and Target.Authority. Use URL.Scheme and URL.Host instead, respectively (#​6363)
Behavior Changes
  • client: percent-encode the default authority for the channel (#​6428)
  • xds: require EDS service name to be set in a CDS cluster with an 'xdstp' resource name (gRFC A47) (#​6438)
New Features
  • reflection: support the v1 reflection service and update Register to register both v1alpha and v1 (#​6329)
  • xds: add support for string matcher in RBAC header matching (#​6419)
  • alts: add support for GRPC_ALTS_MAX_CONCURRENT_HANDSHAKES env var (#​6267)
  • balancer/weightedroundrobin: de-experimentalize name of LB policy (#​6477)
Bug Fixes
  • status: status.FromError now returns an error with codes.Unknown when the error implements the GRPCStatus() method, and calling GRPCStatus() returns nil (#​6374)
  • server: fix bug preventing TCP user timeout from being set on the connection when TLS is used (#​6321)
  • client: eliminate connection churn during an address update that differs only in balancer attributes (#​6439)
  • clusterresolver: handle EDS nacks, resource-not-found errors, and DNS Resolver errors correctly (#​6436, #​6461)
  • xds/ringhash: cache connectivity state of subchannels inside picker to avoid rare races (#​6351)

Configuration

📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
Copy link
Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 12 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.20 -> 1.22.9
github.com/google/uuid v1.3.0 -> v1.6.0
golang.org/x/net v0.23.0 -> v0.34.0
google.golang.org/protobuf v1.30.0 -> v1.36.4
github.com/cespare/xxhash/v2 v2.2.0 -> v2.3.0
github.com/go-logr/logr v1.2.3 -> v1.4.2
github.com/golang/protobuf v1.5.3 -> v1.5.4
github.com/google/go-cmp v0.5.9 -> v0.6.0
golang.org/x/oauth2 v0.7.0 -> v0.25.0
golang.org/x/sys v0.18.0 -> v0.29.0
golang.org/x/term v0.18.0 -> v0.28.0
golang.org/x/text v0.14.0 -> v0.21.0
google.golang.org/genproto/googleapis/rpc v0.0.0-20230525234030-28d5490b6b19 -> v0.0.0-20250115164207-1a7da9e5054f
File name: konnectivity-client/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 8 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.20 -> 1.22.9
golang.org/x/net v0.17.0 -> v0.34.0
google.golang.org/protobuf v1.30.0 -> v1.36.4
github.com/cespare/xxhash/v2 v2.2.0 -> v2.3.0
github.com/go-logr/logr v0.1.0 -> v1.4.2
github.com/golang/protobuf v1.5.3 -> v1.5.4
golang.org/x/sys v0.13.0 -> v0.29.0
golang.org/x/text v0.13.0 -> v0.21.0
google.golang.org/genproto/googleapis/rpc v0.0.0-20230525234030-28d5490b6b19 -> v0.0.0-20250115164207-1a7da9e5054f

@openshift-ci openshift-ci bot requested review from csrwng and sjenning March 16, 2025 18:12
@openshift-ci openshift-ci bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Mar 16, 2025
Copy link

openshift-ci bot commented Mar 16, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: red-hat-konflux[bot]
Once this PR has been reviewed and has the lgtm label, please assign enxebre for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

openshift-ci bot commented Mar 16, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants