Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump google.golang.org/grpc from 1.26.0 to 1.36.0 #13

Closed

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Mar 16, 2021

Bumps google.golang.org/grpc from 1.26.0 to 1.36.0.

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.36.0

New Features

  • xds bootstrap: support config content in env variable (#4153)

Bug Fixes

  • encoding/proto: do not panic when types do not match (#4218)

Documentation

Release 1.35.1

  • encoding/proto: do not panic when types do not match (#4218)
  • xds: add env var protection for client-side security (#4247)

Release 1.35.0

Behavior Changes

  • roundrobin: strip attributes from addresses (#4024)
  • balancer: set RPC metadata in address attributes, instead of Metadata field (#4041)

New Features

  • support unix-abstract schema (#4079)
  • xds: implement experimental RouteAction timeout support (#4116)
  • xds: Implement experimental circuit breaking support. (#4050)

Bug Fixes

  • xds: server_features should be a child of xds_servers and not a sibling (#4087)
  • xds: NACK more invalid RDS responses (#4120)

Release 1.34.2

  • encoding/proto: do not panic when types do not match (#4218)
  • xds: add env var protection for client-side security (#4247)

Release 1.34.1

  • xds client: Updated v3 type for http connection manager (#4137)
  • lrs: use JSON for locality's String representation (#4135)
  • eds/lrs: handle nil when LRS is disabled (#4086)
  • client: fix "unix" scheme handling for some corner cases (#4021)

Release 1.34.0

New Features

  • client: implement support for "unix" resolver scheme (#3890)
  • rds: allow case_insensitive path matching (#3997)
  • credentials/insecure: implement insecure credentials. (#3964)
  • lrs: handle multiple clusters in LRS stream (#3935)

Performance Improvements

... (truncated)

Commits
  • f74f033 Change version to 1.36.0 (#4198)
  • e6d71ad encoding/proto: do not panic when types do not match (#4218) (#4223)
  • 61962d0 status: document nil error handling of FromError (#4196)
  • 9280052 balancergroup: Propagate balancer.BuildOptions to child policies (#4184)
  • b753f49 xds testing: increase timeout from 90 minutes to 120 minutes (#4191)
  • 7b8d65a xds: rename internal/client files to remove client prefix (#4188)
  • f005af0 examples: delete profiling example since profiling support was rolled back (#...
  • 0bc7417 xds: report drops by circuit breaking (#4171)
  • e526a29 xds: Remove v3Support environment variable (#4174)
  • 7bb497f grpc: Update protobuf regenrate script (#4177)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Joshua Winters and others added 30 commits March 12, 2021 22:28
- Verifies user is part of orgs and spaces for group claims

Signed-off-by: Joshua Winters <jwinters@pivotal.io>
Co-authored-by: Shash Reddy <sreddy@pivotal.io>
Co-authored-by: Topher Bullock <tbullock@pivotal.io>
Signed-off-by: Josh Winters <jwinters@pivotal.io>
Signed-off-by: Daniel Lavoie <dlavoie@live.ca>
Signed-off-by: Joshua Winters <jwinters@pivotal.io>
Co-authored-by: Rui Yang <ryang@pivotal.io>
Co-authored-by: Rui Yang <ryang@pivotal.io>
Signed-off-by: Joshua Winters <jwinters@pivotal.io>
Signed-off-by: Zoe Tian <ztian@pivotal.io>
Co-authored-by: Ciro S. Costa <cscosta@pivotal.io>
Signed-off-by: w3tian <w3tian@uwaterloo.ca>
Signed-off-by: Rui Yang <ryang@pivotal.io>
Co-authored-by: Joshua Winters <jwinters@pivotal.io>
Signed-off-by: Joshua Winters <jwinters@pivotal.io>
Co-authored-by: Rui Yang <ryang@pivotal.io>
gofumpt-ed

Signed-off-by: Rui Yang <ryang@pivotal.io>
Signed-off-by: Rui Yang <ruiya@vmware.com>
- this assumes that the client is already bcrytped
when passed to dex. Similar to user passwords.

Signed-off-by: Josh Winters <jwinters@pivotal.io>
Co-authored-by: Vikram Yadav <vyadav@pivotal.io>
* if enabled, it will make sure client secret is bcrypted correctly
* if not, it falls back to old behaviour that allowing empty client
secret and comparing plain text, though now it will do
ConstantTimeCompare to avoid a timing attack.

So in either way it should provide more secure of client secret
verification.

Co-authored-by: Alex Surraci <suraci.alex@gmail.com>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Co-authored-by: Shash Reddy <sreddy@pivotal.io>
Signed-off-by: Joshua Winters <jwinters@pivotal.io>
Signed-off-by: Josh Winters <jwinters@pivotal.io>
Co-authored-by: Mark Huang <mhuang@pivotal.io>
Signed-off-by: Rui Yang <ryang@pivotal.io>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Signed-off-by: Rui Yang <ruiya@vmware.com>
move default key values configure to connector construct function

Signed-off-by: Rui Yang <ruiya@vmware.com>
Co-authored-by: Rui Yang <ruiya@vmware.com>
Signed-off-by: Josh Winters <jwinters@pivotal.io>
Signed-off-by: Rui Yang <ryang@pivotal.io>
Co-authored-by: Aidan Oldershaw <aoldershaw@pivotal.io>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Co-authored-by: Aidan Oldershaw <aoldershaw@pivotal.io>
Co-authored-by: Vikram Yadav <vyadav@pivotal.io>
Signed-off-by: Rui Yang <ruiya@vmware.com>
Unify the interface for reading web statics. Now it could read an
OS directory or get the content on live

One could use

//go:embed static
var webFiles embed.FS

anywhere and config dex server to take the file system by setting

WebConfig{WebFS: webFiles}

Signed-off-by: Rui Yang <ruiya@vmware.com>
Co-authored-by: Aidan Oldershaw <aoldershaw@pivotal.io>
update WebFS doc

Signed-off-by: Rui Yang <ruiya@vmware.com>
Co-authored-by: Aidan Oldershaw <aoldershaw@pivotal.io>
Co-authored-by: Rui Yang <ruiya@vmware.com>
Signed-off-by: Alex Suraci <suraci.alex@gmail.com>
CI Bot and others added 5 commits March 16, 2021 18:36
The official docker release for this release can be pulled from

```
ghcr.io/dexidp/dex:v2.28.0
```

**Features:**

- Add c_hash to id_token, issued on /auth endpoint, when in hybrid flow (dexidp#1773, @HEllRZA)
- Allow configuration of returned auth proxy header (dexidp#1839, @seuf)
- Allow to disable os.ExpandEnv for storage + connector configs by env variable DEX_EXPAND_ENV = false (dexidp#1902, @heidemn-faro)
- Added the possibility to activate lowercase for UPN-Strings (dexidp#1888, @VF-mbrauer)
- Add "Cache-control: no-store" and "Pragma: no-cache" headers to token responses (dexidp#1948, @nabokihms)
- Add gomplate to the docker image (dexidp#1893, @nabokihms)
- Graceful shutdown (dexidp#1963, @nabokihms)
- Allow public clients created with API to have no client_secret (dexidp#1871, @spohner)

**Bugfixes:**

- Fix the etcd PKCE AuthCode deserialization (dexidp#1908, @bnu0)
- Fix garbage collection logging of device codes and device request (dexidp#1918, @nabokihms)
- Discovery endpoint contains updated claims and auth methods (dexidp#1951, @nabokihms)
- Return invalid_grant error if auth code is invalid or expired (dexidp#1952, @nabokihms)
- Return an error to auth requests with the "request" parameter (dexidp#1956, @nabokihms)

**Minor changes:**

- Change default themes to light/dark (dexidp#1858, @nabokihms)
- Various developer experience improvements
- Dependency upgrades
- Tons of small fixes and changes
Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.26.0 to 1.36.0.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.26.0...v1.36.0)

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Mar 16, 2021

The following labels could not be found: area/dependencies.

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Mar 26, 2021

Superseded by #21.

@dependabot dependabot bot closed this Mar 26, 2021
@dependabot dependabot bot deleted the dependabot/go_modules/google.golang.org/grpc-1.36.0 branch March 26, 2021 07:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants