Terry Wilson
7bd0797496
all: Update netty to 4.1.77.Final and netty_tcnative to 2.0.53.Final ( #9027 )
...
all: Update netty to 4.1.77.Final and netty_tcnative to 2.0.53.Final
Also switches to a non-release version of rules_jvm_external to allow Bazel build to work with artifact classifiers.
2022-06-24 10:47:27 -07:00
Eric Anderson
8996702715
SECURITY.md: grpc version table should include future versions
2022-06-22 09:04:32 -07:00
sanjaypujare
d7f951a9d8
all: update netty to 4.1.72.Final and tcnative to 2.0.46.Final ( #8780 )
2022-01-07 15:34:59 -08:00
ZHANG Dapeng
25022f6846
dep: bump netty to 4.1.63.Final and tcnative to 2.0.38.Final ( #8167 )
...
Upgrade Netty. This should also resolve #7830 .
2021-09-21 09:14:54 -07:00
Leonardo Pistone
1a655622c7
Document that xds uses grpc-netty-shaded ( #7877 )
2021-05-11 19:19:40 -07:00
Srini Polavarapu
2a62de0559
Add link to CVE process ( #7832 )
2021-01-22 12:42:05 -08:00
Eric Anderson
8359d0b710
netty: Upgrade to Netty 4.1.52 and tcnative 2.0.34
...
The tiny cache size was removed from the bytebuf allocator and so was
deprecated. TLSv1.3 was enabled by the upgrade, which fails mTLS
connections at different times. Conscrypt is incompatible with the
default TrustManager when TLSv1.3 is enabled so we explicitly disable
TLSv1.3 when Conscrypt is used for the moment.
2020-12-29 15:20:46 -08:00
Chengyuan Zhang
eb871698e3
Revert "SECURITY.md: add instruction for disabling Conscrypt's default TrustManager ( #6962 )" ( #7428 )
...
This reverts commit e089ceaadc .
2020-09-16 10:07:52 -07:00
Eric Anderson
720df64fd2
Upgrade to Netty 4.1.51 and tcnative 2.0.31
2020-08-25 14:52:21 -07:00
Chengyuan Zhang
e089ceaadc
SECURITY.md: add instruction for disabling Conscrypt's default TrustManager ( #6962 )
2020-04-22 11:28:24 -07:00
Jihun Cho
bf12157fc4
build: bump netty to 4.1.48.Final, bump tcnative to 2.0.30.Final ( #6845 )
2020-03-24 11:54:59 -07:00
ZhenLian
557da62305
netty: Upgrade Netty (4.1.45.Final) & tcnative (2.0.28.Final)
2020-02-06 10:03:14 -08:00
ST-DDT
2afe13487c
api: Fix javadoc for ManagedChannelBuilder#forTarget(String)
...
The dns scheme is only the default scheme with grpc-java. Other
libraries could add more NameResolvers and thus change the default. For
compatibility reasons, the schema should therefore be specified
explicitly.
2019-12-16 15:51:53 -08:00
Przemek Piotrowski
9668102f05
netty: bump to 4.1.42 ( #6175 )
...
netty: bump to 4.1.42
2019-10-01 13:41:06 -07:00
ST-DDT
d5b63e9c68
docs, examples: Update the maven plugins version ( #6065 )
2019-08-20 14:35:03 -07:00
Carl Mastrangelo
06e9b88147
netty: bump to 4.1.38
...
* netty: bump to 4.1.38
2019-07-24 14:29:26 -07:00
Carl Mastrangelo
2548bcd7c7
netty: bump to 4.1.37
2019-06-28 11:40:56 -07:00
Sebastian Schmidt
e4b666aaeb
Fixing typo in SECURITY.md
...
See https://en.wikipedia.org/wiki/Cipher_suite
2019-06-11 22:33:30 -07:00
Chengyuan Zhang
f81201024e
upgrade netty version to 4.1.35 and netty-tcnative version to 2.0.25 ( #5818 )
2019-06-03 11:40:59 -07:00
Eric Anderson
2b7269b68c
SECURITY.md: Add Fedora 30 package installation instructions
...
Fixes #5688
2019-05-14 15:37:43 -07:00
Jihun Cho
aed4e40b60
netty: bump netty version to 4.1.34.Final ( #5449 )
2019-03-08 15:58:48 -08:00
Eric Anderson
2dc00cec4a
SECURITY.md: Fix syntax and typos in mutual TLS interceptor example
...
Fixes #4905
2019-03-07 16:53:34 -07:00
Nguyen Quang Huy
05d5e4802a
doc: Change http to https for security links
...
For security, we should change http into https links.
Co-Authored-By: Nguyen Van Trung [trungnvfet@outlook.com ](mailto:trungnvfet@outlook.com)
Signed-off-by: Nguyen Quang Huy [huynq0911@gmail.com ](mailto:huynq0911@gmail.com)
2019-02-27 17:25:42 -08:00
Eric Anderson
0d97507919
SECURITY.md: Don't suggest users to use Jetty ALPN
...
I fixed many of these elsewhere in the document via 4ba168f28 , but I
didn't update the troubleshooting section previously.
2019-02-27 16:32:59 -07:00
Eric Anderson
1da3f65e7b
SECURITY.md: tcnative/ALPN works on Alpine
...
In testing, I discovered that Alpine does in fact work. Update the
documentation with the error you might see if you are simply missing a
package (for Googling) as well as fixes.
2019-02-27 15:19:49 -07:00
ZHANG Dapeng
d0ecc08705
all: fix lint
2019-01-31 09:31:13 -08:00
Eric Anderson
4ba168f28a
SECURITY.md: Rewrite/reflow our recommendations
...
Much of these sections pre-dated gRPC 1.0 and Java 9. Modernize them to be more
on-point and clear.
2019-01-28 16:26:44 -08:00
Carl Mastrangelo
edede01da6
netty: bump to 4.1.32 and tcnative 2.0.20
2018-12-05 14:41:30 -08:00
ZHANG Dapeng
e9ba65a42e
all: sync tcnative version
...
The helloworld TLS example can not run properly with the outdated examples/build.gradle.
2018-12-03 13:19:17 -08:00
Carl Mastrangelo
5362017c5a
netty: update to 4.1.30 and tcn 2.0.17
2018-10-11 16:31:14 -07:00
Carl Mastrangelo
7d455964f6
all: update to netty 4.1.27 and tcnative 2.0.12
2018-07-20 16:36:00 -07:00
DmPanov
49d7e5fd0b
examples: replace client certificate in trust store in 'Hello world example with TLS with mutual auth'
...
... with proper CA certificate to fix SSLV3_ALERT_HANDSHAKE_FAILURE in two host with different IPs setup, switch to required client auth to fail on incorrect configuration
2018-06-13 12:30:57 -07:00
Carl Mastrangelo
4388d901c8
netty: update to 4.1.25
...
Updates #4495
2018-05-23 17:16:45 -07:00
Stephane Maarek
277c33c37f
SECURITY.md: updated netty from 2.0.6 to 2.0.7
...
Master currently is for grpc >= 0.11 so it doesn't make sense that the SECURITY.md instructs to use the 2.0.6 (which triggers an error) - see https://github.com/grpc/grpc-java/issues/3989
2018-05-14 10:48:34 -07:00
Eric Anderson
41e98ef72b
SECURITY.md: Add reference to grpc-netty-shaded
...
Many people going to the troubleshooting section would be fixed by
swapping to grpc-netty-shaded, so we should call that out.
2018-04-03 08:45:03 -07:00
Ray Tsang
ae42d666ad
SECURITY.md: Added more troubleshooting instructions
2018-03-23 11:05:57 -07:00
Eric Anderson
cb2f62bbbf
SECURITY.md: Update "known combinations" table for Netty bump
2018-03-07 13:39:47 -08:00
Eric Anderson
8c51683af1
SECURITY.md: Mention netty-handler instead of codec-http2
...
netty-handler has SslHandler which is really the piece that needs to
agree with netty-tcnative. But as I mention, all of netty should be a
consistent version, otherwise it may randomly break due to internal API
changes.
2018-02-14 14:52:04 -08:00
Eric Gribkoff
722d6f0bea
okhttp: support Conscrypt security provider
2018-01-31 10:45:27 -08:00
Garrett Jones
7cdd35c270
SECURITY.md: Fix netty-codec-http2 typo
2017-12-01 12:48:46 -08:00
Carl Mastrangelo
09307ce191
netty: update to 4.1.17-Final
2017-11-28 13:52:23 -08:00
Eric Anderson
47821fa74e
SECURITY.md: Avoid needing to update tcnative table every release
...
This also fixes an oversight for the 1.0.2+ releases, since they had a
different netty version.
2017-11-17 13:16:14 -08:00
Ray Tsang
80a8c8f3d7
netty: Updated ALPN error message and added troubleshooting procedures
2017-11-01 13:01:43 -07:00
Eric Gribkoff
e1fd615df8
SECURITY.md: provider must be installed before channel creation
2017-10-31 16:22:07 -07:00
zpencer
fedef8f866
SECURITY: tcnative version should be 2.0.6.Final ( #3611 )
2017-10-24 13:29:18 -07:00
Sudharaka Palamakumbura
b2bcaccb34
Fix typo in SECURITY.md
2017-10-13 19:35:24 -07:00
zpencer
b579528c89
Update README to reference 1.6.1 ( #3428 )
2017-08-31 15:24:33 -07:00
Carl Mastrangelo
2175004363
all: recommend latest os maven detector
2017-07-18 10:44:37 -07:00
xuwei-k
6038b0987e
update netty-tcnative version in SECURITY.md
2017-06-12 09:41:03 -07:00
Carl Mastrangelo
ecbacf0856
all: fix bad ref to ServerCall
2017-05-26 14:27:53 -07:00