Go to file
Nguyen Quang Huy 05d5e4802a doc: Change http to https for security links
For security, we should change http into https links.

Co-Authored-By: Nguyen Van Trung [trungnvfet@outlook.com](mailto:trungnvfet@outlook.com)
Signed-off-by: Nguyen Quang Huy [huynq0911@gmail.com](mailto:huynq0911@gmail.com)
2019-02-27 17:25:42 -08:00
.github github/lock.yml: Lock GitHub issues after 90 days 2018-09-28 09:48:13 -07:00
all all: exclude internal/testing package from jacoco coverage report 2018-11-21 15:03:13 -08:00
alts netty,alts: hide ProtocolNegotiator behind an accessor, and... 2019-02-15 13:59:58 -08:00
android Start 1.20.0 development cycle 2019-02-12 14:46:28 -08:00
android-interop-testing Start 1.20.0 development cycle 2019-02-12 14:46:28 -08:00
auth all: try out mockito rule 2019-02-27 16:40:47 -08:00
benchmarks doc: Change http to https for security links 2019-02-27 17:25:42 -08:00
bom Adding Bom (#5209) 2019-02-01 14:00:05 -08:00
buildscripts all: fix publish not having checksum (#5398) 2019-02-27 09:39:02 -08:00
compiler Start 1.20.0 development cycle 2019-02-12 14:46:28 -08:00
context all: remove java6 type args 2019-02-04 10:03:50 -08:00
core all: try out mockito rule 2019-02-27 16:40:47 -08:00
cronet core: pass transport attributes to ClientStreamTracer.Factory.newClientStreamTracer() (#5380) 2019-02-21 11:13:51 -08:00
documentation Start 1.20.0 development cycle 2019-02-12 14:46:28 -08:00
examples Upgrade to Mockito 1.10.19 2019-02-27 17:06:01 -07:00
gae-interop-testing doc: Change http to https for security links 2019-02-27 17:25:42 -08:00
gradle/wrapper Upgrade Gradle to 4.9 2018-07-26 13:43:50 -07:00
grpclb core: pass transport attributes to ClientStreamTracer.Factory.newClientStreamTracer() (#5380) 2019-02-21 11:13:51 -08:00
interop-testing core: pass transport attributes to ClientStreamTracer.Factory.newClientStreamTracer() (#5380) 2019-02-21 11:13:51 -08:00
netty core: pass transport attributes to ClientStreamTracer.Factory.newClientStreamTracer() (#5380) 2019-02-21 11:13:51 -08:00
okhttp core: pass transport attributes to ClientStreamTracer.Factory.newClientStreamTracer() (#5380) 2019-02-21 11:13:51 -08:00
protobuf Upgrade Guava to 26.0-android 2019-02-01 10:16:38 -08:00
protobuf-lite all: remove java6 type args 2019-02-04 10:03:50 -08:00
protobuf-nano Upgrade to protobuf 3.6.1 2019-02-07 13:40:53 -08:00
services Upgrade to protobuf 3.6.1 2019-02-07 13:40:53 -08:00
stub all: remove java6 type args 2019-02-04 10:03:50 -08:00
testing core: pass transport attributes to ClientStreamTracer.Factory.newClientStreamTracer() (#5380) 2019-02-21 11:13:51 -08:00
testing-proto Upgrade to protobuf 3.6.1 2019-02-07 13:40:53 -08:00
xds xds: fallback handling 2019-02-26 13:13:42 -08:00
.bazelignore bazel: ignore examples/ from root WORKSPACE 2018-12-18 14:54:57 -07:00
.gitattributes Include Java's @Deprecated annotation on RPC services or methods with `option deprecated = true;` 2018-08-15 12:24:01 -07:00
.gitignore Partial fix for fresh Intellij import 2017-12-15 08:42:39 -08:00
.travis.yml travis.yml: Stop testing jdk9 2019-02-27 11:20:19 -07:00
AUTHORS all: update to Apache 2 licence 2017-05-31 13:29:01 -07:00
BUILD.bazel java_grpc_library.bzl: workaround strict_deps 2019-02-11 15:17:34 -08:00
COMPILING.md Upgrade to protobuf 3.6.1 2019-02-07 13:40:53 -08:00
CONTRIBUTING.md CONTRIBUTING.md: Fix google java style guide link (#5318) 2019-02-04 15:09:41 -08:00
LICENSE fix LICENSE file (#3107) 2017-06-20 08:52:39 +02:00
NOTICE.txt doc: Update NOTICE with xds third_party dependencies 2019-02-21 11:15:26 -08:00
README.md doc: Change http to https for security links 2019-02-27 17:25:42 -08:00
RELEASING.md doc: Change http to https for security links 2019-02-27 17:25:42 -08:00
SECURITY.md doc: Change http to https for security links 2019-02-27 17:25:42 -08:00
WORKSPACE all: rename Bazel workspace to io_grpc_grpc_java 2018-02-22 13:59:45 -08:00
build.gradle Upgrade to Mockito 1.10.19 2019-02-27 17:06:01 -07:00
codecov.yml Disable codecov comment and changes status 2016-05-01 22:39:12 -07:00
gradlew all: update to gradle 4.0.1 2017-07-12 10:07:14 -07:00
gradlew.bat all: update to gradle 3.2 2016-11-23 14:43:18 -08:00
java_grpc_library.bzl java_grpc_library.bzl: workaround strict_deps 2019-02-11 15:17:34 -08:00
repositories.bzl core: Add "fake" dependency on Guava's failureaccess 2019-02-12 14:17:28 -08:00
run-test-client.sh Avoid interop build instructions when already built 2018-10-11 17:17:13 -07:00
run-test-server.sh Avoid interop build instructions when already built 2018-10-11 17:17:13 -07:00
settings.gradle Adding Bom (#5209) 2019-02-01 14:00:05 -08:00

README.md

gRPC-Java - An RPC library and framework

gRPC-Java works with JDK 7. gRPC-Java clients are supported on Android API levels 14 and up (Ice Cream Sandwich and later). Deploying gRPC servers on an Android device is not supported.

TLS usage typically requires using Java 8, or Play Services Dynamic Security Provider on Android. Please see the Security Readme.

Homepage: grpc.io
Mailing List: grpc-io@googlegroups.com

Join the chat at https://gitter.im/grpc/grpc Build Status Coverage Status

Getting Started

For a guided tour, take a look at the quick start guide or the more explanatory gRPC basics.

The examples and the Android example are standalone projects that showcase the usage of gRPC.

Download

Download the JARs. Or for Maven with non-Android, add to your pom.xml:

<dependency>
  <groupId>io.grpc</groupId>
  <artifactId>grpc-netty-shaded</artifactId>
  <version>1.19.0</version>
</dependency>
<dependency>
  <groupId>io.grpc</groupId>
  <artifactId>grpc-protobuf</artifactId>
  <version>1.19.0</version>
</dependency>
<dependency>
  <groupId>io.grpc</groupId>
  <artifactId>grpc-stub</artifactId>
  <version>1.19.0</version>
</dependency>

Or for Gradle with non-Android, add to your dependencies:

compile 'io.grpc:grpc-netty-shaded:1.19.0'
compile 'io.grpc:grpc-protobuf:1.19.0'
compile 'io.grpc:grpc-stub:1.19.0'

For Android client, use grpc-okhttp instead of grpc-netty-shaded and grpc-protobuf-lite instead of grpc-protobuf:

compile 'io.grpc:grpc-okhttp:1.19.0'
compile 'io.grpc:grpc-protobuf-lite:1.19.0'
compile 'io.grpc:grpc-stub:1.19.0'

Development snapshots are available in Sonatypes's snapshot repository.

Generated Code

For protobuf-based codegen, you can put your proto files in the src/main/proto and src/test/proto directories along with an appropriate plugin.

For protobuf-based codegen integrated with the Maven build system, you can use protobuf-maven-plugin (Eclipse and NetBeans users should also look at os-maven-plugin's IDE documentation):

<build>
  <extensions>
    <extension>
      <groupId>kr.motd.maven</groupId>
      <artifactId>os-maven-plugin</artifactId>
      <version>1.5.0.Final</version>
    </extension>
  </extensions>
  <plugins>
    <plugin>
      <groupId>org.xolstice.maven.plugins</groupId>
      <artifactId>protobuf-maven-plugin</artifactId>
      <version>0.5.1</version>
      <configuration>
        <protocArtifact>com.google.protobuf:protoc:3.6.1:exe:${os.detected.classifier}</protocArtifact>
        <pluginId>grpc-java</pluginId>
        <pluginArtifact>io.grpc:protoc-gen-grpc-java:1.19.0:exe:${os.detected.classifier}</pluginArtifact>
      </configuration>
      <executions>
        <execution>
          <goals>
            <goal>compile</goal>
            <goal>compile-custom</goal>
          </goals>
        </execution>
      </executions>
    </plugin>
  </plugins>
</build>

For protobuf-based codegen integrated with the Gradle build system, you can use protobuf-gradle-plugin:

apply plugin: 'com.google.protobuf'

buildscript {
  repositories {
    mavenCentral()
  }
  dependencies {
    classpath 'com.google.protobuf:protobuf-gradle-plugin:0.8.5'
  }
}

protobuf {
  protoc {
    artifact = "com.google.protobuf:protoc:3.6.1"
  }
  plugins {
    grpc {
      artifact = 'io.grpc:protoc-gen-grpc-java:1.19.0'
    }
  }
  generateProtoTasks {
    all()*.plugins {
      grpc {}
    }
  }
}

The prebuilt protoc-gen-grpc-java binary uses glibc on Linux. If you are compiling on Alpine Linux, you may want to use the Alpine grpc-java package which uses musl instead.

API Stability

APIs annotated with @Internal are for internal use by the gRPC library and should not be used by gRPC users. APIs annotated with @ExperimentalApi are subject to change in future releases, and library code that other projects may depend on should not use these APIs.

We recommend using the grpc-java-api-checker (an Error Prone plugin) to check for usages of @ExperimentalApi and @Internal in any library code that depends on gRPC. It may also be used to check for @Internal usage or unintended @ExperimentalApi consumption in non-library code.

How to Build

If you are making changes to gRPC-Java, see the compiling instructions.

High-level Components

At a high level there are three distinct layers to the library: Stub, Channel, and Transport.

Stub

The Stub layer is what is exposed to most developers and provides type-safe bindings to whatever datamodel/IDL/interface you are adapting. gRPC comes with a plugin to the protocol-buffers compiler that generates Stub interfaces out of .proto files, but bindings to other datamodel/IDL are easy and encouraged.

Channel

The Channel layer is an abstraction over Transport handling that is suitable for interception/decoration and exposes more behavior to the application than the Stub layer. It is intended to be easy for application frameworks to use this layer to address cross-cutting concerns such as logging, monitoring, auth, etc.

Transport

The Transport layer does the heavy lifting of putting and taking bytes off the wire. The interfaces to it are abstract just enough to allow plugging in of different implementations. Note the transport layer API is considered internal to gRPC and has weaker API guarantees than the core API under package io.grpc.

gRPC comes with three Transport implementations:

  1. The Netty-based transport is the main transport implementation based on Netty. It is for both the client and the server.
  2. The OkHttp-based transport is a lightweight transport based on OkHttp. It is mainly for use on Android and is for client only.
  3. The in-process transport is for when a server is in the same process as the client. It is useful for testing, while also being safe for production use.