Skip to content

Bump google.golang.org/grpc from 1.63.2 to 1.79.3#153

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/google.golang.org/grpc-1.79.3
Open

Bump google.golang.org/grpc from 1.63.2 to 1.79.3#153
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/go_modules/google.golang.org/grpc-1.79.3

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Mar 19, 2026

Bumps google.golang.org/grpc from 1.63.2 to 1.79.3.

Release notes

Sourced from google.golang.org/grpc's releases.

Release 1.79.3

Security

  • server: fix an authorization bypass where malformed :path headers (missing the leading slash) could bypass path-based restricted "deny" rules in interceptors like grpc/authz. Any request with a non-canonical path is now immediately rejected with an Unimplemented error. (#8981)

Release 1.79.2

Bug Fixes

  • stats: Prevent redundant error logging in health/ORCA producers by skipping stats/tracing processing when no stats handler is configured. (grpc/grpc-go#8874)

Release 1.79.1

Bug Fixes

Release 1.79.0

API Changes

  • mem: Add experimental API SetDefaultBufferPool to change the default buffer pool. (#8806)
  • experimental/stats: Update MetricsRecorder to require embedding the new UnimplementedMetricsRecorder (a no-op struct) in all implementations for forward compatibility. (#8780)

Behavior Changes

  • balancer/weightedtarget: Remove handling of Addresses and only handle Endpoints in resolver updates. (#8841)

New Features

  • experimental/stats: Add support for asynchronous gauge metrics through the new AsyncMetricReporter and RegisterAsyncReporter APIs. (#8780)
  • pickfirst: Add support for weighted random shuffling of endpoints, as described in gRFC A113.
    • This is enabled by default, and can be turned off using the environment variable GRPC_EXPERIMENTAL_PF_WEIGHTED_SHUFFLING. (#8864)
  • xds: Implement :authority rewriting, as specified in gRFC A81. (#8779)
  • balancer/randomsubsetting: Implement the random_subsetting LB policy, as specified in gRFC A68. (#8650)

Bug Fixes

  • credentials/tls: Fix a bug where the port was not stripped from the authority override before validation. (#8726)
  • xds/priority: Fix a bug causing delayed failover to lower-priority clusters when a higher-priority cluster is stuck in CONNECTING state. (#8813)
  • health: Fix a bug where health checks failed for clients using legacy compression options (WithDecompressor or RPCDecompressor). (#8765)
  • transport: Fix an issue where the HTTP/2 server could skip header size checks when terminating a stream early. (#8769)
  • server: Propagate status detail headers, if available, when terminating a stream during request header processing. (#8754)

Performance Improvements

  • credentials/alts: Optimize read buffer alignment to reduce copies. (#8791)
  • mem: Optimize pooling and creation of buffer objects. (#8784)
  • transport: Reduce slice re-allocations by reserving slice capacity. (#8797)

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Summary by cubic

Upgrade google.golang.org/grpc to 1.79.3 to pick up a server-side security fix (strict path validation) and recent bug fixes/perf improvements. This also updates the module to Go 1.24.0 and refreshes several indirect dependencies.

  • Dependencies

    • google.golang.org/grpc → 1.79.3 (security hardening: rejects malformed/non-canonical paths)
    • Go toolchain in go.mod → 1.24.0
    • OpenTelemetry → go.opentelemetry.io/otel@1.39.0 (plus go.opentelemetry.io/auto/sdk)
    • github.com/stretchr/testify → 1.11.1
    • Updated golang.org/x/{crypto,net,sys,text,mod,sync,tools} and Google genproto/protobuf
  • Migration

    • Build with Go 1.24+.
    • gRPC servers now reject non-canonical request paths. Verify any path-based interceptors or grpc/authz rules and run routing/auth integration tests.

Written for commit 360a768. Summary will update on new commits.

Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.63.2 to 1.79.3.
- [Release notes](https://github.com/grpc/grpc-go/releases)
- [Commits](grpc/grpc-go@v1.63.2...v1.79.3)

---
updated-dependencies:
- dependency-name: google.golang.org/grpc
  dependency-version: 1.79.3
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Dependency updates go Pull requests that update go code labels Mar 19, 2026
Copy link

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No issues found across 2 files

Architecture diagram
sequenceDiagram
    participant Client as gRPC Client
    participant Transport as gRPC Server Transport
    participant Interceptor as Authz/Telemetry Interceptor
    participant LB as Balancer (PickFirst/xDS)
    participant App as Service Implementation
    participant OTel as OpenTelemetry SDK

    Note over Client,App: Request Handling Flow (v1.79.3)

    Client->>Transport: Send gRPC Request (HTTP/2)
    
    alt NEW: Non-canonical :path header (e.g. missing leading slash)
        Transport-->>Client: 404 Unimplemented (Immediate Rejection)
    else Valid Canonical Path
        Transport->>Transport: CHANGED: Optimized buffer allocation (mem.pool)
        Transport->>Interceptor: Execute Middleware Chain
        
        Note over Interceptor: NEW: Secure path-based rules validation
        Interceptor->>Interceptor: Validate Permissions (grpc/authz)
        
        Interceptor->>App: Invoke RPC Method
        
        opt Downstream Call
            App->>LB: Resolve Endpoints
            LB->>LB: NEW: Weighted random shuffling (Pick First)
            LB->>LB: NEW: Authority rewriting (xDS)
        end

        App-->>Interceptor: Return Response / Error
    end

    Interceptor->>OTel: CHANGED: Export Metrics/Traces (v1.39.0)
    Interceptor-->>Client: Final gRPC Status & Metadata
Loading

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Dependency updates go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants