Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: grpc/grpc
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v1.59.0
Choose a base ref
...
head repository: grpc/grpc
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v1.59.2
Choose a head ref
  • 6 commits
  • 101 files changed
  • 6 contributors

Commits on Sep 29, 2023

  1. Configuration menu
    Copy the full SHA
    ea0e95b View commit details
    Browse the repository at this point in the history

Commits on Oct 6, 2023

  1. [Release] Bump version to 1.59.1 (on v1.59.x branch) (#34620)

    Change was created by the release automation script. See go/grpc-release
    veblush authored Oct 6, 2023
    Configuration menu
    Copy the full SHA
    0df9acc View commit details
    Browse the repository at this point in the history

Commits on Oct 18, 2023

  1. [Fix Python Deadlock] Guard grpc_ssl_credentials_create with nogil (v…

    …1.59.x backport) (#34725)
    
    Backport of #34712 to v1.59.x.
    ---
    Fix: #34672
    With some recent changes in core, now `grpc_ssl_credentials_create` is
    guarded by `gpr_once_init`. In our current implementation, The thread
    got `gpr_once_init` lock might require GIL lock during the execution of
    `grpc_ssl_credentials_create`, which might cause a deadlock if another
    thread is holding GIL lock and waiting for `gpr_once_init` lock.
    
    This change adds `with nogil` to calls to native function
    `grpc_ssl_credentials_create` to make sure GIL is released before
    calling `grpc_ssl_credentials_create`.
    <!--
    
    If you know who should review your pull request, please assign it to
    that
    person, otherwise the pull request would get assigned randomly.
    
    If your pull request is for a specific language, please add the
    appropriate
    lang label.
    
    -->
    XuanWang-Amos authored Oct 18, 2023
    1 Configuration menu
    Copy the full SHA
    50b02da View commit details
    Browse the repository at this point in the history

Commits on Oct 23, 2023

  1. [chttp2] Rollup of fixes for CVE-2023-44487 (#34763)

    Co-authored-by: ctiller <ctiller@users.noreply.github.com>
    Co-authored-by: Mark D. Roth <roth@google.com>
    3 people authored Oct 23, 2023
    1 Configuration menu
    Copy the full SHA
    e33af6c View commit details
    Browse the repository at this point in the history

Commits on Oct 27, 2023

  1. 1 Configuration menu
    Copy the full SHA
    05430a5 View commit details
    Browse the repository at this point in the history

Commits on Oct 30, 2023

  1. Backport #34550 and #34685 to v1.59.x (#34826)

    These two PRs bump the Python Windows distribtest timeout, which has
    been causing several artifact builds and distribtests to fail.
    
    ---------
    
    Co-authored-by: Xuan Wang <xuanwn@google.com>
    gnossen and XuanWang-Amos authored Oct 30, 2023
    1 Configuration menu
    Copy the full SHA
    883e5f7 View commit details
    Browse the repository at this point in the history
Loading