Sourced from google.golang.org/grpc's releases.
Release 1.68.0
Known Issues
- The recently added
grpc.NewClient
function is incompatible with forward proxies, because it resolves the target hostname on the client instead of passing the hostname to the proxy. This bug has been present since the introduction ofNewClient
. A fix is expected to be a part of grpc-go v1.70. (#7556)
Behavior Changes
- stats/opentelemetry/csm: Get mesh_id local label from "CSM_MESH_ID" environment variable, rather than parsing from bootstrap file (#7740)
- orca (experimental): if using an ORCA listener, it must now be registered only on a READY SubConn, and the listener will automatically be stopped when the connection is lost. (#7663)
- client:
ClientConn.Close()
now closes transports simultaneously and waits for transports to be closed before returning. (#7666)- credentials: TLS credentials created via
NewTLS
that usetls.Config.GetConfigForClient
will now have CipherSuites, supported TLS versions and ALPN configured automatically. These were previously only set for configs not using theGetConfigForClient
option. (#7709)Bug Fixes
- transport: prevent deadlock in client transport shutdown when writing the GOAWAY frame hangs. (#7662)
- mem: reuse buffers more accurately by using slice capacity instead of length (#7702)
- Special Thanks:
@​PapaCharlie
- status: Fix regression caused by #6919 in status.Details() causing it to return a wrapped type when getting proto messages generated with protoc-gen-go < v1. (#7724)
Dependencies
- Bump minimum supported Go version to
go1.22.7
. (#7624)Release 1.67.1
Bug Fixes
- transport: Fix a bug causing stream failures due to miscalculation of the flow control window in both clients and servers. (#7667)
- xds/server: Fix xDS Server memory leak. (#7681)
Release 1.67.0
Bug Fixes
- ringhash: when used with multiple EDS priorities, fix bug that could prevent a higher priority from recovering from transient failure. (#7364)
- Special Thanks:
@​atollena
Behavior Changes
- In accordance with RFC 7540, clients and servers will now reject TLS connections that don't support ALPN. This can be disabled by setting the environment variable
GRPC_ENFORCE_ALPN_ENABLED
tofalse
(case insensitive). Please file a bug if you encounter any issues with this behavior. The environment variable to revert this behavior will be removed in an upcoming release. (#7535)Release 1.66.3
Bug Fixes
acba4d3
Change version to 1.68.0 (#7743)5363dca
credentials: Apply defaults to TLS configs provided through
GetConfigForClien...056dc64
status: Fix status incompatibility introduced by #6919
and move non-regenerat...b79fb61
mem: use slice capacity instead of length, to determine whether to pool
buffe...54841ef
stats/opentelemetry/csm: Get mesh_id local label from
"CSM_MESH_ID" environme...ad81c20
pickfirstleaf: minor simplification to reconcileSubConnsLocked method
(#7731)b850ea5
transport : wait for goroutines to exit before transport closes (#7666)00b9e14
pickfirst: New pick first policy for dualstack (#7498)18a4eac
testutils: add couple of log statements to the restartable listener type
(#7716)fdc2ec2
xdsclient: deflake TestADS_ResourcesAreRequestedAfterStreamRestart (#7720)