cloudflared/vendor/google.golang.org/grpc
João Oliveirinha a408612f26 TUN-9467: bump coredns to solve CVE
* TUN-9467: bump coredns to solve CVE
2025-06-12 10:46:10 +00:00
..
attributes TUN-8052: Update go to 1.21.5 2023-12-15 12:17:21 +00:00
backoff TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
balancer TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
binarylog/grpc_binarylog_v1 TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
channelz TUN-7066: Bump coredns to v1.10.0 2023-01-26 09:30:08 -08:00
codes TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
connectivity TUN-5675: Remove github.com/dgrijalva/jwt-go dependency by upgrading coredns version 2022-01-25 15:24:13 +00:00
credentials TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
encoding TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
experimental/stats TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
grpclog TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
health/grpc_health_v1 TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
internal TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
keepalive TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
mem TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
metadata TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
peer TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
resolver TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
serviceconfig TUN-7066: Bump coredns to v1.10.0 2023-01-26 09:30:08 -08:00
stats TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
status TUN-8052: Update go to 1.21.5 2023-12-15 12:17:21 +00:00
tap TUN-8052: Update go to 1.21.5 2023-12-15 12:17:21 +00:00
AUTHORS TUN-528: Move cloudflared into a separate repo 2018-07-19 15:02:24 -05:00
backoff.go TUN-7066: Bump coredns to v1.10.0 2023-01-26 09:30:08 -08:00
balancer_wrapper.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
call.go TUN-8052: Update go to 1.21.5 2023-12-15 12:17:21 +00:00
clientconn.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
CODE-OF-CONDUCT.md AUTH-2105: Adds support for local forwarding. Refactor auditlogger creation. 2019-10-10 15:25:03 -05:00
codec.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
CONTRIBUTING.md TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
dialoptions.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
doc.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
GOVERNANCE.md AUTH-2105: Adds support for local forwarding. Refactor auditlogger creation. 2019-10-10 15:25:03 -05:00
interceptor.go TUN-8052: Update go to 1.21.5 2023-12-15 12:17:21 +00:00
LICENSE TUN-528: Move cloudflared into a separate repo 2018-07-19 15:02:24 -05:00
MAINTAINERS.md TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
Makefile TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
NOTICE.txt TUN-5675: Remove github.com/dgrijalva/jwt-go dependency by upgrading coredns version 2022-01-25 15:24:13 +00:00
picker_wrapper.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
preloader.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
README.md TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
resolver_wrapper.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
rpc_util.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
SECURITY.md TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
server.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
service_config.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
stream_interfaces.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
stream.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00
trace_notrace.go TUN-8407: Upgrade go to version 1.22.2 2024-05-07 16:58:57 +01:00
trace_withtrace.go TUN-8407: Upgrade go to version 1.22.2 2024-05-07 16:58:57 +01:00
trace.go TUN-8407: Upgrade go to version 1.22.2 2024-05-07 16:58:57 +01:00
version.go TUN-9467: bump coredns to solve CVE 2025-06-12 10:46:10 +00:00

gRPC-Go

GoDoc GoReportCard codecov

The Go implementation of gRPC: A high performance, open source, general RPC framework that puts mobile and HTTP/2 first. For more information see the Go gRPC docs, or jump directly into the quick start.

Prerequisites

Installation

Simply add the following import to your code, and then go [build|run|test] will automatically fetch the necessary dependencies:

import "google.golang.org/grpc"

Note: If you are trying to access grpc-go from China, see the FAQ below.

Learn more

FAQ

I/O Timeout Errors

The golang.org domain may be blocked from some countries. go get usually produces an error like the following when this happens:

$ go get -u google.golang.org/grpc
package google.golang.org/grpc: unrecognized import path "google.golang.org/grpc" (https fetch: Get https://google.golang.org/grpc?go-get=1: dial tcp 216.239.37.1:443: i/o timeout)

To build Go code, there are several options:

  • Set up a VPN and access google.golang.org through that.

  • With Go module support: it is possible to use the replace feature of go mod to create aliases for golang.org packages. In your project's directory:

    go mod edit -replace=google.golang.org/grpc=github.com/grpc/grpc-go@latest
    go mod tidy
    go mod vendor
    go build -mod=vendor
    

    Again, this will need to be done for all transitive dependencies hosted on golang.org as well. For details, refer to golang/go issue #28652.

Compiling error, undefined: grpc.SupportPackageIsVersion

Please update to the latest version of gRPC-Go using go get google.golang.org/grpc.

How to turn on logging

The default logger is controlled by environment variables. Turn everything on like this:

$ export GRPC_GO_LOG_VERBOSITY_LEVEL=99
$ export GRPC_GO_LOG_SEVERITY_LEVEL=info

The RPC failed with error "code = Unavailable desc = transport is closing"

This error means the connection the RPC is using was closed, and there are many possible reasons, including:

  1. mis-configured transport credentials, connection failed on handshaking
  2. bytes disrupted, possibly by a proxy in between
  3. server shutdown
  4. Keepalive parameters caused connection shutdown, for example if you have configured your server to terminate connections regularly to trigger DNS lookups. If this is the case, you may want to increase your MaxConnectionAgeGrace, to allow longer RPC calls to finish.

It can be tricky to debug this because the error happens on the client side but the root cause of the connection being closed is on the server side. Turn on logging on both client and server, and see if there are any transport errors.