The NetBSD Project

CVS log for pkgsrc/lang/go/version.mk

[BACK] Up to [cvs.NetBSD.org] / pkgsrc / lang / go

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.99 / (download) - annotate - [select for diffs], Thu Sep 3 07:03:26 2020 UTC (3 weeks, 1 day ago) by bsiegert
Branch: MAIN
CVS Tags: HEAD
Changes since 1.98: +2 -2 lines
Diff to previous 1.98 (colored)

Update go114 to 1.14.8.

go1.14.8 (released 2020/09/01) includes security fixes to the net/http/cgi and
net/http/fcgi packages. See the Go 1.14.8 milestone on our issue tracker for
details.

Revision 1.98 / (download) - annotate - [select for diffs], Thu Sep 3 06:47:21 2020 UTC (3 weeks, 1 day ago) by bsiegert
Branch: MAIN
Changes since 1.97: +3 -3 lines
Diff to previous 1.97 (colored)

Update go115 to 1.15.1.

go1.15.1 (released 2020/09/01) includes security fixes to the net/http/cgi and
net/http/fcgi packages. See the Go 1.15.1 milestone on our issue tracker for
details.

Revision 1.97 / (download) - annotate - [select for diffs], Fri Aug 21 19:50:22 2020 UTC (4 weeks, 6 days ago) by bsiegert
Branch: MAIN
Changes since 1.96: +2 -1 lines
Diff to previous 1.96 (colored)

Add a package for Go 1.15.

The latest Go release, version 1.15, arrives six months after Go 1.14. Most of
its changes are in the implementation of the toolchain, runtime, and libraries.
As always, the release maintains the Go 1 promise of compatibility. We expect
almost all Go programs to continue to compile and run as before.

Go 1.15 includes substantial improvements to the linker, improves allocation
for small objects at high core counts, and deprecates X.509 CommonName. GOPROXY
now supports skipping proxies that return errors and a new embedded tzdata
package has been added.

There are no changes to the language.

Revision 1.96 / (download) - annotate - [select for diffs], Fri Aug 14 18:45:56 2020 UTC (5 weeks, 6 days ago) by bsiegert
Branch: MAIN
Changes since 1.95: +2 -2 lines
Diff to previous 1.95 (colored)

Update go114 to 1.14.7.

go1.14.7 (released 2020/08/06) includes security fixes to the encoding/binary
package. See the Go 1.14.7 milestone on our issue tracker for details.

Revision 1.95 / (download) - annotate - [select for diffs], Fri Aug 14 18:28:29 2020 UTC (5 weeks, 6 days ago) by bsiegert
Branch: MAIN
Changes since 1.94: +2 -2 lines
Diff to previous 1.94 (colored)

Update go113 to 1.13.15.

go1.13.15 (released 2020/08/06) includes security fixes to the encoding/binary
package. See the Go 1.13.15 milestone on our issue tracker for details.

Revision 1.92.2.2 / (download) - annotate - [select for diffs], Mon Jul 20 14:59:01 2020 UTC (2 months ago) by spz
Branch: pkgsrc-2020Q2
Changes since 1.92.2.1: +2 -2 lines
Diff to previous 1.92.2.1 (colored) to branchpoint 1.92 (colored) next main 1.93 (colored)

Pullup ticket #6279 - requested by bsiegert
lang/go114: security update

Revisions pulled up:
- lang/go/version.mk                                            1.94
- lang/go114/PLIST                                              1.5
- lang/go114/distinfo                                           1.8

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Fri Jul 17 17:20:06 UTC 2020

   Modified Files:
           pkgsrc/lang/go: version.mk
           pkgsrc/lang/go114: PLIST distinfo

   Log Message:
   Update go114 to 1.14.6.

   go1.14.5 (released 2020/07/14) includes security fixes to the crypto/x509
   and
   net/http packages. See the Go 1.14.5 milestone on our issue tracker for
   details.

   go1.14.6 (released 2020/07/16) includes fixes to the go command, the
   compiler,
   the linker, vet, and the database/sql, encoding/json, net/http, reflect, and
   testing packages. See the Go 1.14.6 milestone on our issue tracker for
   details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.93 -r1.94 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/lang/go114/PLIST
   cvs rdiff -u -r1.7 -r1.8 pkgsrc/lang/go114/distinfo

Revision 1.92.2.1 / (download) - annotate - [select for diffs], Mon Jul 20 14:52:20 2020 UTC (2 months ago) by spz
Branch: pkgsrc-2020Q2
Changes since 1.92: +2 -2 lines
Diff to previous 1.92 (colored)

Pullup ticket #6278 - requested by bsiegert
lang/go113: security update

Revisions pulled up:
- lang/go/version.mk                                            1.93
- lang/go113/PLIST                                              1.4
- lang/go113/distinfo                                           1.8

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Fri Jul 17 17:10:20 UTC 2020

   Modified Files:
           pkgsrc/lang/go: version.mk
           pkgsrc/lang/go113: PLIST distinfo

   Log Message:
   Update go113 to 1.13.14.

   go1.13.12 (released 2020/06/01) includes fixes to the runtime, and the
   go/types
   and math/big packages. See the Go 1.13.12 milestone on our issue tracker for
   details.

   go1.13.13 (released 2020/07/14) includes security fixes to the crypto/x509
   and
   net/http packages. See the Go 1.13.13 milestone on our issue tracker for
   details.

   go1.13.14 (released 2020/07/16) includes fixes to the compiler, vet, and the
   database/sql, net/http, and reflect packages. See the Go 1.13.14 milestone
   on our issue tracker for details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.92 -r1.93 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.3 -r1.4 pkgsrc/lang/go113/PLIST
   cvs rdiff -u -r1.7 -r1.8 pkgsrc/lang/go113/distinfo

Revision 1.94 / (download) - annotate - [select for diffs], Fri Jul 17 17:20:05 2020 UTC (2 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.93: +2 -2 lines
Diff to previous 1.93 (colored)

Update go114 to 1.14.6.

go1.14.5 (released 2020/07/14) includes security fixes to the crypto/x509 and
net/http packages. See the Go 1.14.5 milestone on our issue tracker for
details.

go1.14.6 (released 2020/07/16) includes fixes to the go command, the compiler,
the linker, vet, and the database/sql, encoding/json, net/http, reflect, and
testing packages. See the Go 1.14.6 milestone on our issue tracker for details.

Revision 1.93 / (download) - annotate - [select for diffs], Fri Jul 17 17:10:20 2020 UTC (2 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.92: +2 -2 lines
Diff to previous 1.92 (colored)

Update go113 to 1.13.14.

go1.13.12 (released 2020/06/01) includes fixes to the runtime, and the go/types
and math/big packages. See the Go 1.13.12 milestone on our issue tracker for
details.

go1.13.13 (released 2020/07/14) includes security fixes to the crypto/x509 and
net/http packages. See the Go 1.13.13 milestone on our issue tracker for details.

go1.13.14 (released 2020/07/16) includes fixes to the compiler, vet, and the
database/sql, net/http, and reflect packages. See the Go 1.13.14 milestone
on our issue tracker for details.

Revision 1.92 / (download) - annotate - [select for diffs], Wed Jun 17 09:37:25 2020 UTC (3 months, 1 week ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2020Q2-base
Branch point for: pkgsrc-2020Q2
Changes since 1.91: +2 -2 lines
Diff to previous 1.91 (colored)

Update go114 to 1.14.4.

go1.14.3 (released 2020/05/14) includes fixes to cgo, the compiler, the
runtime, and the go/doc and math/big packages. See the Go 1.14.3
milestone on our issue tracker for details.

go1.14.4 (released 2020/06/01) includes fixes to the go doc command, the
runtime, and the encoding/json and os packages. See the Go 1.14.4
milestone on our issue tracker for details.

Revision 1.91 / (download) - annotate - [select for diffs], Sat May 16 08:33:07 2020 UTC (4 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.90: +2 -2 lines
Diff to previous 1.90 (colored)

Update go113 to 1.13.11.

go1.13.11 (released 2020/05/14) includes fixes to the compiler. See the Go
1.13.11 milestone on our issue tracker for details.

Revision 1.90 / (download) - annotate - [select for diffs], Fri May 1 16:39:59 2020 UTC (4 months, 3 weeks ago) by tnn
Branch: MAIN
Changes since 1.89: +7 -2 lines
Diff to previous 1.89 (colored)

go/version.mk: now supports aarch64

Revision 1.89 / (download) - annotate - [select for diffs], Sun Apr 12 11:09:03 2020 UTC (5 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.88: +2 -3 lines
Diff to previous 1.88 (colored)

Update go113 to 1.13.10.

go1.13.10 (released 2020/04/08) includes fixes to the go command, the
runtime, os/exec, and time packages. See the Go 1.13.10 milestone on our
issue tracker for details.

Revision 1.88 / (download) - annotate - [select for diffs], Sun Apr 12 09:41:18 2020 UTC (5 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.87: +2 -2 lines
Diff to previous 1.87 (colored)

Set 1.14 as default Go version.

1.14.2 is good now :)

Revision 1.87 / (download) - annotate - [select for diffs], Thu Apr 9 13:28:38 2020 UTC (5 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.86: +2 -2 lines
Diff to previous 1.86 (colored)

Update go114 to 1.14.2.

go1.14.2 (released 2020/04/08) includes fixes to cgo, the go command, the
runtime, os/exec, and testing packages. See the Go 1.14.2 milestone on our
issue tracker for details.

From what I know from work, 1.14.1 had a nasty runtime bug that is now
fixed.

Revision 1.86 / (download) - annotate - [select for diffs], Sat Mar 21 16:51:10 2020 UTC (6 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2020Q1-base, pkgsrc-2020Q1
Changes since 1.85: +2 -2 lines
Diff to previous 1.85 (colored)

Update go113 to 1.13.9.

This release includes fixes to the go command, tools, the runtime,
the toolchain, and to the crypto/cypher package.

View the release notes for more information:
    https://golang.org/doc/devel/release.html#go1.13.minor

Revision 1.85 / (download) - annotate - [select for diffs], Sat Mar 21 10:07:48 2020 UTC (6 months ago) by bsiegert
Branch: MAIN
Changes since 1.84: +1 -3 lines
Diff to previous 1.84 (colored)

Remove GO112_VERSION and GO111_VERSION.

Revision 1.84 / (download) - annotate - [select for diffs], Fri Mar 20 19:50:48 2020 UTC (6 months ago) by bsiegert
Branch: MAIN
Changes since 1.83: +2 -2 lines
Diff to previous 1.83 (colored)

Update go114 to 1.14.1.

This release include fixes to the go command, tools, the runtime,
the toolchain, and to the crypto/cypher package.

View the release notes for more information:
    https://golang.org/doc/devel/release.html#go1.14.minor

Revision 1.83 / (download) - annotate - [select for diffs], Thu Feb 27 16:34:31 2020 UTC (6 months, 4 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.82: +2 -2 lines
Diff to previous 1.82 (colored)

Update go113 to 1.13.8.

This release includes fixes to the runtime, the crypto/x509, and
net/http packages.

Revision 1.82 / (download) - annotate - [select for diffs], Thu Feb 27 14:32:57 2020 UTC (6 months, 4 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.81: +2 -1 lines
Diff to previous 1.81 (colored)

Add a package for Go 1.14.

The default will remain at 1.13 for the next branch.

The latest Go release, version 1.14, arrives six months after Go 1.13. Most of
its changes are in the implementation of the toolchain, runtime, and libraries.
As always, the release maintains the Go 1 promise of compatibility. We expect
almost all Go programs to continue to compile and run as before.

See the release notes at https://golang.org/doc/go1.14.

Revision 1.81 / (download) - annotate - [select for diffs], Sun Feb 23 19:21:27 2020 UTC (7 months ago) by bsiegert
Branch: MAIN
Changes since 1.80: +2 -2 lines
Diff to previous 1.80 (colored)

Update go112 to 1.12.7.

These releases include fixes to the runtime, the crypto/x509, and
net/http packages.

Revision 1.80 / (download) - annotate - [select for diffs], Sun Feb 2 09:36:40 2020 UTC (7 months, 3 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.79: +2 -2 lines
Diff to previous 1.79 (colored)

Update go113 to 1.13.7 (security release).

Panic in crypto/x509 certificate parsing and golang.org/x/crypto/cryptobyte

On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
functions of golang.org/x/crypto/cryptobyte can lead to a panic.

The malformed certificate can be delivered via a crypto/tls connection to a
client, or to a server that accepts client certificates. net/http clients can
be made to crash by an HTTPS server, while net/http servers that accept client
certificates will recover the panic and are unaffected.

Thanks to Project Wycheproof for providing the test cases that led to the
discovery of this issue.

The issue is CVE-2020-7919 and Go issue golang.org/issue/36837.

This is also fixed in version v0.0.0-20200124225646-8b5121be2f68 of
golang.org/x/crypto/cryptobyte.

Revision 1.79 / (download) - annotate - [select for diffs], Sun Feb 2 09:26:39 2020 UTC (7 months, 3 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.78: +2 -2 lines
Diff to previous 1.78 (colored)

Update go112 to 1.12.16 (security release).

Panic in crypto/x509 certificate parsing and golang.org/x/crypto/cryptobyte

On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
functions of golang.org/x/crypto/cryptobyte can lead to a panic.

The malformed certificate can be delivered via a crypto/tls connection to a
client, or to a server that accepts client certificates. net/http clients can
be made to crash by an HTTPS server, while net/http servers that accept client
certificates will recover the panic and are unaffected.

Thanks to Project Wycheproof for providing the test cases that led to the
discovery of this issue.

The issue is CVE-2020-7919 and Go issue golang.org/issue/36837.

This is also fixed in version v0.0.0-20200124225646-8b5121be2f68 of
golang.org/x/crypto/cryptobyte.

Revision 1.78 / (download) - annotate - [select for diffs], Fri Jan 10 12:56:35 2020 UTC (8 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.77: +2 -2 lines
Diff to previous 1.77 (colored)

go: use go113 as the default for building packages.

I did a preliminary bulk build to find build failures resulting from this
change and fixed the fallout in www/grafana. Everything else seemed to be
ok.

Revision 1.77 / (download) - annotate - [select for diffs], Fri Jan 10 12:53:01 2020 UTC (8 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.76: +2 -2 lines
Diff to previous 1.76 (colored)

Update go112 to 1.12.15.

These releases include fixes to the runtime and to the
net/http package.

The macOS releases enable the Hardened Runtime. See
https://golang.org/issue/34986 for details.

View the release notes for more information:
    https://golang.org/doc/devel/release.html#go1.13.minor

Revision 1.76 / (download) - annotate - [select for diffs], Fri Jan 10 12:40:43 2020 UTC (8 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.75: +2 -2 lines
Diff to previous 1.75 (colored)

Update go113 to 1.13.6.

These releases include fixes to the runtime and to the
net/http package.

The macOS releases enable the Hardened Runtime. See
https://golang.org/issue/34986 for details.

View the release notes for more information:
    https://golang.org/doc/devel/release.html#go1.13.minor

Revision 1.75 / (download) - annotate - [select for diffs], Fri Dec 13 07:39:33 2019 UTC (9 months, 1 week ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2019Q4-base, pkgsrc-2019Q4
Changes since 1.74: +2 -2 lines
Diff to previous 1.74 (colored)

Update go112 to 1.12.14.

go1.12.13 (released 2019/10/31) fixes an issue on macOS 10.15 Catalina where
the non-notarized installer and binaries were being rejected by Gatekeeper.
Only macOS users who hit this issue need to update.

go1.12.14 (released 2019/12/04) includes a fix to the runtime. See the Go
1.12.14 milestone on our issue tracker for details.

Revision 1.74 / (download) - annotate - [select for diffs], Mon Dec 9 09:59:31 2019 UTC (9 months, 2 weeks ago) by jperkin
Branch: MAIN
Changes since 1.73: +8 -6 lines
Diff to previous 1.73 (colored)

go: Split *_SUPPORTED variables out into new go-vars.mk.

It's not always possible to include go-package.mk earlier than bsd.prefs.mk
in a package, for example if the package defines its own do-install target,
so move out the *_SUPPORTED variables that need to be included first.

Revision 1.73 / (download) - annotate - [select for diffs], Sun Dec 8 14:42:02 2019 UTC (9 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.72: +2 -1 lines
Diff to previous 1.72 (colored)

Add go113.

I forgot to include this file in the go113 commit, thanks wiz@ for
notifying me!

Revision 1.72 / (download) - annotate - [select for diffs], Sat Dec 7 18:15:13 2019 UTC (9 months, 2 weeks ago) by rillig
Branch: MAIN
Changes since 1.71: +4 -1 lines
Diff to previous 1.71 (colored)

lang/go: add go to the tools directory

This makes it easier to run the Go compiler from within the build
environment created by "bmake build-env".

Revision 1.69.2.1 / (download) - annotate - [select for diffs], Sun Nov 17 08:30:02 2019 UTC (10 months, 1 week ago) by spz
Branch: pkgsrc-2019Q3
Changes since 1.69: +2 -2 lines
Diff to previous 1.69 (colored) next main 1.70 (colored)

Pullup ticket #6083 - requested by leot
lang/go112: security update
lang/go: update available version

Revisions pulled up:
- lang/go/version.mk                                            1.70
- lang/go112/PLIST                                              1.8
- lang/go112/distinfo                                           1.8

Revision bump for:
- archivers/go-xz/Makefile
- chat/coyim/Makefile
- chat/matterircd/Makefile
- databases/go-etcd/Makefile
- databases/go-ldap/Makefile
- databases/influxdb/Makefile
- databases/postgres_exporter/Makefile
- databases/prometheus/Makefile
- devel/git-lfs/Makefile
- devel/go-afero/Makefile
- devel/go-amber/Makefile
- devel/go-appengine/Makefile
- devel/go-assert/Makefile
- devel/go-blackfriday/Makefile
- devel/go-buffruneio/Makefile
- devel/go-cast/Makefile
- devel/go-check/Makefile
- devel/go-cli/Makefile
- devel/go-cobra/Makefile
- devel/go-colorable/Makefile
- devel/go-colortext/Makefile
- devel/go-colour/Makefile
- devel/go-consul-api/Makefile
- devel/go-debounce/Makefile
- devel/go-ed25519/Makefile
- devel/go-emoji/Makefile
- devel/go-errors/Makefile
- devel/go-flags-svent/Makefile
- devel/go-fnmatch/Makefile
- devel/go-fs/Makefile
- devel/go-fsnotify/Makefile
- devel/go-fsync/Makefile
- devel/go-gitmap/Makefile
- devel/go-glog/Makefile
- devel/go-gls/Makefile
- devel/go-gocode/Makefile
- devel/go-godef/Makefile
- devel/go-godirwalk/Makefile
- devel/go-godotenv/Makefile
- devel/go-golang-lru/Makefile
- devel/go-goorgeous/Makefile
- devel/go-gopkgs/Makefile
- devel/go-goptlib/Makefile
- devel/go-goreturns/Makefile
- devel/go-gox/Makefile
- devel/go-hashstructure/Makefile
- devel/go-homedir/Makefile
- devel/go-humanize/Makefile
- devel/go-i18n/Makefile
- devel/go-immutable-radix/Makefile
- devel/go-ini/Makefile
- devel/go-iochan/Makefile
- devel/go-isatty/Makefile
- devel/go-jwalterweatherman/Makefile
- devel/go-kingpin.v3-unstable/Makefile
- devel/go-locker/Makefile
- devel/go-logrus/Makefile
- devel/go-mapstructure/Makefile
- devel/go-mapstructure-bep/Makefile
- devel/go-mow-cli/Makefile
- devel/go-nbreader/Makefile
- devel/go-nitro/Makefile
- devel/go-osext/Makefile
- devel/go-pflag/Makefile
- devel/go-properties/Makefile
- devel/go-protobuf/Makefile
- devel/go-purell/Makefile
- devel/go-ratelimit/Makefile
- devel/go-repr/Makefile
- devel/go-review/Makefile
- devel/go-sanitized_anchor_name/Makefile
- devel/go-shellwords/Makefile
- devel/go-shuffle/Makefile
- devel/go-siphash/Makefile
- devel/go-sync/Makefile
- devel/go-sys/Makefile
- devel/go-termbox/Makefile
- devel/go-testify/Makefile
- devel/go-thrift/Makefile
- devel/go-tools/Makefile
- devel/go-try/Makefile
- devel/go-viper/Makefile
- devel/go-yaml/Makefile
- devel/golint/Makefile
- devel/google-api-go-client/Makefile
- graphics/go-image/Makefile
- graphics/go-imaging/Makefile
- graphics/go-resize/Makefile
- graphics/go-smartcrop/Makefile
- lang/go-hcl/Makefile
- mail/postforward/Makefile
- math/go-stats/Makefile
- math/go-units/Makefile
- misc/go-genproto/Makefile
- misc/go-genproto-googleapis-rpc/Makefile
- net/aws-sdk-go/Makefile
- net/dnscrypt-proxy2/Makefile
- net/gcloud-golang-metadata/Makefile
- net/go-dns/Makefile
- net/go-dnstap/Makefile
- net/go-framestream/Makefile
- net/go-grpc/Makefile
- net/go-net/Makefile
- net/go-ovh/Makefile
- net/go-websocket/Makefile
- net/hub/Makefile
- net/obfs4proxy/Makefile
- net/syncthing/Makefile
- pkgtools/pkglint/Makefile
- security/2fa/Makefile
- security/go-asn1-ber/Makefile
- security/go-crypt/Makefile
- security/go-crypto/Makefile
- security/go-mkcert/Makefile
- security/go-oauth2/Makefile
- security/go-sftp/Makefile
- security/vault/Makefile
- sysutils/beats/Makefile
- sysutils/consul/Makefile
- sysutils/fzf/Makefile
- sysutils/goreman/Makefile
- sysutils/lf/Makefile
- sysutils/node_exporter/Makefile
- sysutils/vultr/Makefile
- textproc/go-chroma/Makefile
- textproc/go-diff/Makefile
- textproc/go-glob/Makefile
- textproc/go-inflect/Makefile
- textproc/go-md2man/Makefile
- textproc/go-mmark/Makefile
- textproc/go-prose/Makefile
- textproc/go-regexp2/Makefile
- textproc/go-runewidth/Makefile
- textproc/go-sentences/Makefile
- textproc/go-tablewriter/Makefile
- textproc/go-text/Makefile
- textproc/sift/Makefile
- www/caddy/Makefile
- www/gitea/Makefile
- www/go-ace/Makefile
- www/go-cssmin/Makefile
- www/go-gogs-client/Makefile
- www/go-gohtml/Makefile
- www/go-libsass/Makefile
- www/go-minify/Makefile
- www/go-parse/Makefile
- www/go-spritewell/Makefile
- www/go-tocss/Makefile
- www/go-toml-burntsushi/Makefile
- www/go-toml-pelletier/Makefile
- www/go-urlesc/Makefile
- www/go-webhooks/Makefile
- www/grafana/Makefile
- www/hugo/Makefile
- www/pup/Makefile

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Fri Oct 18 14:48:29 UTC 2019

   Modified Files:
           pkgsrc/lang/go: version.mk
           pkgsrc/lang/go112: PLIST distinfo

   Log Message:
   Update go112 to 1.12.12.

   qo1.12.11 (released 2019/10/17) includes security fixes to the crypto/dsa
   package. See the Go 1.12.11 milestone on our issue tracker for details.

   go1.12.12 (released 2019/10/17) includes fixes to the go command, runtime,
   syscall and net packages. See the Go 1.12.12 milestone on our issue tracker
   for details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.69 -r1.70 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.7 -r1.8 pkgsrc/lang/go112/PLIST pkgsrc/lang/go112/distinfo

Revision 1.71 / (download) - annotate - [select for diffs], Sun Nov 3 19:04:01 2019 UTC (10 months, 3 weeks ago) by rillig
Branch: MAIN
Changes since 1.70: +12 -12 lines
Diff to previous 1.70 (colored)

lang: align variable assignments

pkglint -Wall -F --only aligned --only indent -r

No manual corrections.

Revision 1.70 / (download) - annotate - [select for diffs], Fri Oct 18 14:48:29 2019 UTC (11 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.69: +2 -2 lines
Diff to previous 1.69 (colored)

Update go112 to 1.12.12.

qo1.12.11 (released 2019/10/17) includes security fixes to the crypto/dsa
package. See the Go 1.12.11 milestone on our issue tracker for details.

go1.12.12 (released 2019/10/17) includes fixes to the go command, runtime,
syscall and net packages. See the Go 1.12.12 milestone on our issue tracker
for details.

Revision 1.69 / (download) - annotate - [select for diffs], Thu Sep 26 18:36:46 2019 UTC (11 months, 4 weeks ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2019Q3-base
Branch point for: pkgsrc-2019Q3
Changes since 1.68: +2 -2 lines
Diff to previous 1.68 (colored)

Update go112 to 1.12.10.

Commit ok'd by wiz@ for PMC.

Go 1.12.10:

net/http (through net/textproto) used to accept and normalize invalid
HTTP/1.1 headers with a space before the colon, in violation of RFC 7230. If
a Go server is used behind an uncommon reverse proxy that accepts and
forwards but doesn't normalize such invalid headers, the reverse proxy and
the server can interpret the headers differently. This can lead to filter
bypasses or request smuggling, the latter if requests from separate clients
are multiplexed onto the same upstream connection by the proxy. Such invalid
headers are now rejected by Go servers, and passed without normalization to
Go client applications.

The issue is CVE-2019-16276 and Go issue golang.org/issue/34540.

Go 1.12.9:

go1.12.9 (released 2019/08/15) includes fixes to the linker, and the os and
math/big packages. See the Go 1.12.9 milestone on our issue tracker for
details.

Revision 1.68 / (download) - annotate - [select for diffs], Tue Sep 17 04:39:20 2019 UTC (12 months, 1 week ago) by dbj
Branch: MAIN
Changes since 1.67: +6 -1 lines
Diff to previous 1.67 (colored)

lang/go: on osx 10.9 and earlier, use go110

go 1.11 removed support for osx 10.8 and 10.9
https://github.com/golang/go/issues/23122

Revision 1.67 / (download) - annotate - [select for diffs], Wed Aug 14 15:42:52 2019 UTC (13 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.66: +2 -2 lines
Diff to previous 1.66 (colored)

go112: update to 1.12.8 (security release).

net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from
untrusted clients could be remotely made to allocate an unlimited amount of
memory, until the program crashes. Servers will now close connections if the
send queue accumulates too many control messages.

The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.

This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.

net/url: parsing validation issue

url.Parse would accept URLs with malformed hosts, such that the Host field
could have arbitrary suffixes that would appear in neither Hostname() nor
Port(), allowing authorization bypasses in certain applications. Note that URLs
with invalid, not numeric ports will now return an error from url.Parse.

The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me)
for discovering and reporting this issue.

Revision 1.66 / (download) - annotate - [select for diffs], Wed Aug 14 15:17:41 2019 UTC (13 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.65: +2 -2 lines
Diff to previous 1.65 (colored)

go111: update to 1.11.13 (security release).

net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from
untrusted clients could be remotely made to allocate an unlimited amount of
memory, until the program crashes. Servers will now close connections if the
send queue accumulates too many control messages.

The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.

This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.

net/url: parsing validation issue

url.Parse would accept URLs with malformed hosts, such that the Host field
could have arbitrary suffixes that would appear in neither Hostname() nor
Port(), allowing authorization bypasses in certain applications. Note that URLs
with invalid, not numeric ports will now return an error from url.Parse.

The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me)
for discovering and reporting this issue.

Revision 1.65 / (download) - annotate - [select for diffs], Sun Jul 14 15:19:55 2019 UTC (14 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.64: +2 -2 lines
Diff to previous 1.64 (colored)

Update go112 to 1.12.7.

This fixes a nasty code-generation bug, among other things:

go1.12.6 (released 2019/06/11) includes fixes to the compiler, the linker,
the go command, and the crypto/x509, net/http, and os packages.
See the Go 1.12.6 milestone on our issue tracker for details.

go1.12.7 (released 2019/07/08) includes fixes to cgo, the compiler,
and the linker. See the Go 1.12.7 milestone on our issue tracker for details.

Revision 1.64 / (download) - annotate - [select for diffs], Sun Jul 14 12:25:18 2019 UTC (14 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.63: +2 -2 lines
Diff to previous 1.63 (colored)

Update go111 to 1.11.12.

go1.11.11 (released 2019/06/11) includes a fix to the crypto/x509 package.
See the Go 1.11.11 milestone on our issue tracker for details.

go1.11.12 (released 2019/07/08) includes fixes to the compiler and the linker.
See the Go 1.11.12 milestone on our issue tracker for details.

Revision 1.63 / (download) - annotate - [select for diffs], Mon May 27 15:16:38 2019 UTC (16 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2019Q2-base, pkgsrc-2019Q2
Changes since 1.62: +2 -2 lines
Diff to previous 1.62 (colored)

Update go112 to 1.12.5.

This release includes fixes to the compiler, the linker, the go command,
the runtime, and the os package.

Same as for go111, remove the pkg/bootstrap tree from the package.

Revision 1.62 / (download) - annotate - [select for diffs], Mon May 27 14:33:10 2019 UTC (16 months ago) by bsiegert
Branch: MAIN
Changes since 1.61: +2 -2 lines
Diff to previous 1.61 (colored)

Update go111 to 1.11.10.

This release includes fixes to the compiler, the linker, the go command, the
runtime, and the os package.

While here, remove pkg/bootstrap from the package, as it is only used
for bootstrapping.

Revision 1.61 / (download) - annotate - [select for diffs], Tue Apr 16 18:30:27 2019 UTC (17 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.60: +2 -2 lines
Diff to previous 1.60 (colored)

Update go112 to 1.12.4.

go1.12.2 (released 2019/04/05) includes fixes to the compiler, the go command,
the runtime, and the doc, net, net/http/httputil, and os packages. See the Go
1.12.2 milestone on our issue tracker for details.

go1.12.3 (released 2019/04/08) was accidentally released without its intended
fix. It is identical to go1.12.2, except for its version number. The intended
fix is in go1.12.4.

go1.12.4 (released 2019/04/11) fixes an issue where using the prebuilt binary
releases on older versions of GNU/Linux led to failures when linking programs
that used cgo. Only Linux users who hit this issue need to update.

Revision 1.60 / (download) - annotate - [select for diffs], Tue Apr 16 18:13:49 2019 UTC (17 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.59: +2 -2 lines
Diff to previous 1.59 (colored)

Update go111 to 1.11.9.

go1.11.7 (released 2019/04/05) includes fixes to the runtime and the net
packages. See the Go 1.11.7 milestone on our issue tracker for details.

go1.11.8 (released 2019/04/08) was accidentally released without its intended
fix. It is identical to go1.11.7, except for its version number. The intended
fix is in go1.11.9.

go1.11.9 (released 2019/04/11) fixes an issue where using the prebuilt binary
releases on older versions of GNU/Linux led to failures when linking programs
that used cgo. Only Linux users who hit this issue need to update.

Revision 1.59 / (download) - annotate - [select for diffs], Sat Mar 16 08:27:56 2019 UTC (18 months, 1 week ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2019Q1-base, pkgsrc-2019Q1
Changes since 1.58: +2 -2 lines
Diff to previous 1.58 (colored)

Update go112 to 1.12.1.

go1.12.1 (released 2019/03/14) includes fixes to cgo, the compiler, the go
command, and the fmt, net/smtp, os, path/filepath, sync, and text/template
packages. See the Go 1.12.1 milestone on our issue tracker for details.

Revision 1.58 / (download) - annotate - [select for diffs], Sat Mar 16 08:19:00 2019 UTC (18 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.57: +2 -2 lines
Diff to previous 1.57 (colored)

Update go111 to 1.11.6.

go1.11.6 (released 2019/03/14) includes fixes to cgo, the compiler, linker,
runtime, go command, and the crypto/x509, encoding/json, net, and net/url
packages. See the Go 1.11.6 milestone on our issue tracker for details.

Revision 1.57 / (download) - annotate - [select for diffs], Sat Mar 9 10:00:44 2019 UTC (18 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.56: +2 -2 lines
Diff to previous 1.56 (colored)

go: switch default version to 1.12.

This means all builds of packages written in Go use 1.12.

Revision 1.56 / (download) - annotate - [select for diffs], Sat Mar 9 09:29:30 2019 UTC (18 months, 2 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.55: +2 -1 lines
Diff to previous 1.55 (colored)

Add a package for Go 1.12.

Some of the highlights include opt-in support for TLS 1.3, improved modules
support (in preparation for being the default in Go 1.13), support for
windows/arm, and improved macOS & iOS forwards compatibility.

See https://blog.golang.org/go1.12.

In pkgsrc, this is _not_ the default version for Go package builds just yet.

Revision 1.53.2.2 / (download) - annotate - [select for diffs], Fri Feb 8 11:31:19 2019 UTC (19 months, 2 weeks ago) by spz
Branch: pkgsrc-2018Q4
Changes since 1.53.2.1: +2 -2 lines
Diff to previous 1.53.2.1 (colored) to branchpoint 1.53 (colored) next main 1.54 (colored)

Pullup ticket #5906 - requested by bsiegert
lang/go111: security update

Revisions pulled up:
- lang/go/version.mk                                            1.54
- lang/go111/distinfo                                           1.5

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Thu Jan 24 09:26:21 UTC 2019

   Modified Files:
           pkgsrc/lang/go: version.mk
           pkgsrc/lang/go111: distinfo

   Log Message:
   Update go111 to 1.11.5 (security).

   This release addresses a recently supported security issue. This DoS
   vulnerability in the crypto/elliptic implementations of the P-521 and P-384
   elliptic curves may let an attacker craft inputs that consume excessive
   amounts of CPU.

   These inputs might be delivered via TLS handshakes, X.509 certificates, JWT
   tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private
   key is reused more than once, the attack can also lead to key recovery.

   The issue is CVE-2019-6486 and Go issue golang.org/issue/29903.
   See the Go issue for more details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.53 -r1.54 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/lang/go111/distinfo

Revision 1.53.2.1 / (download) - annotate - [select for diffs], Fri Feb 8 11:30:52 2019 UTC (19 months, 2 weeks ago) by spz
Branch: pkgsrc-2018Q4
Changes since 1.53: +2 -2 lines
Diff to previous 1.53 (colored)

Pullup ticket #5905 - requested by bsiegert
lang/go110: security update

Revisions pulled up:
- lang/go/version.mk                                            1.55
- lang/go110/distinfo                                           1.4

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Thu Jan 24 09:33:08 UTC 2019

   Modified Files:
           pkgsrc/lang/go: version.mk
           pkgsrc/lang/go110: distinfo

   Log Message:
   Update go110 to 1.10.8 (security).

   This release addresses a recently supported security issue. This DoS
   vulnerability in the crypto/elliptic implementations of the P-521 and P-384
   elliptic curves may let an attacker craft inputs that consume excessive
   amounts of CPU.

   These inputs might be delivered via TLS handshakes, X.509 certificates, JWT
   tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private
   key is reused more than once, the attack can also lead to key recovery.

   The issue is CVE-2019-6486 and Go issue golang.org/issue/29903.
   See the Go issue for more details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.54 -r1.55 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.3 -r1.4 pkgsrc/lang/go110/distinfo

Revision 1.55 / (download) - annotate - [select for diffs], Thu Jan 24 09:33:08 2019 UTC (20 months ago) by bsiegert
Branch: MAIN
Changes since 1.54: +2 -2 lines
Diff to previous 1.54 (colored)

Update go110 to 1.10.8 (security).

This release addresses a recently supported security issue. This DoS
vulnerability in the crypto/elliptic implementations of the P-521 and P-384
elliptic curves may let an attacker craft inputs that consume excessive
amounts of CPU.

These inputs might be delivered via TLS handshakes, X.509 certificates, JWT
tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private
key is reused more than once, the attack can also lead to key recovery.

The issue is CVE-2019-6486 and Go issue golang.org/issue/29903.
See the Go issue for more details.

Revision 1.54 / (download) - annotate - [select for diffs], Thu Jan 24 09:26:21 2019 UTC (20 months ago) by bsiegert
Branch: MAIN
Changes since 1.53: +2 -2 lines
Diff to previous 1.53 (colored)

Update go111 to 1.11.5 (security).

This release addresses a recently supported security issue. This DoS
vulnerability in the crypto/elliptic implementations of the P-521 and P-384
elliptic curves may let an attacker craft inputs that consume excessive
amounts of CPU.

These inputs might be delivered via TLS handshakes, X.509 certificates, JWT
tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private
key is reused more than once, the attack can also lead to key recovery.

The issue is CVE-2019-6486 and Go issue golang.org/issue/29903.
See the Go issue for more details.

Revision 1.53 / (download) - annotate - [select for diffs], Thu Dec 20 17:38:23 2018 UTC (21 months ago) by jperkin
Branch: MAIN
CVS Tags: pkgsrc-2018Q4-base
Branch point for: pkgsrc-2018Q4
Changes since 1.52: +2 -2 lines
Diff to previous 1.52 (colored)

go: Actually bump to 1.11.4.  Unbreaks build.

Revision 1.52 / (download) - annotate - [select for diffs], Sat Dec 15 10:23:32 2018 UTC (21 months, 1 week ago) by bsiegert
Branch: MAIN
Changes since 1.51: +2 -2 lines
Diff to previous 1.51 (colored)

Update go110 to 1.10.7 (security fix).

These releases include fixes to cgo, the compiler, linker, runtime,
documentation, go command, and the net/http and go/types packages.
They include a fix to a bug introduced in Go 1.11.3 and Go 1.10.6
that broke "go get" for import path patterns containing "...".

View the release notes for more information:
    https://golang.org/doc/devel/release.html#go1.10.minor

Revision 1.51 / (download) - annotate - [select for diffs], Mon Nov 12 14:40:21 2018 UTC (22 months, 1 week ago) by jperkin
Branch: MAIN
Changes since 1.50: +2 -1 lines
Diff to previous 1.50 (colored)

*: Add CTF_SUPPORTED/CTF_FILES_SKIP where necessary.

Revision 1.50 / (download) - annotate - [select for diffs], Mon Nov 12 13:48:45 2018 UTC (22 months, 1 week ago) by jperkin
Branch: MAIN
Changes since 1.49: +3 -2 lines
Diff to previous 1.49 (colored)

go: Set STRIP_DEBUG_SUPPORTED=no

Stripping golang binaries renders them useless.

Revision 1.49 / (download) - annotate - [select for diffs], Sun Nov 4 18:22:47 2018 UTC (22 months, 3 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.48: +2 -2 lines
Diff to previous 1.48 (colored)

This file was missing from the previous commit.

go111-1.11.2.

Revision 1.48 / (download) - annotate - [select for diffs], Sun Nov 4 12:36:09 2018 UTC (22 months, 3 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.47: +2 -2 lines
Diff to previous 1.47 (colored)

Update go110 to 1.10.5.

go1.10.5 (released 2018/11/02) includes fixes to the go command, linker,
runtime and the database/sql package. See the Go 1.10.5 milestone on our issue
tracker for details.

Revision 1.47 / (download) - annotate - [select for diffs], Fri Oct 26 13:49:23 2018 UTC (23 months ago) by leot
Branch: MAIN
Changes since 1.46: +5 -2 lines
Diff to previous 1.46 (colored)

go: Improve PRINT_PLIST_AWK patterns and avoid possible double definition

- Move GO_PLATFORM definition in lang/go/version.mk in order that also lang/go*
  packages can (re)use it
- Change PRINT_PLIST_AWK pattern that replace all ${GO_PLATFORM} and apply it
  only when ${GO_PLATFORM} is a directory (between two "/").  There are only
  3 exceptions to that in lang/go14.
  Move it to version.mk so lang/go* PLIST can be mostly automatically
  generated.

These changes should help to avoid (most) manual editing of
lang/go*/PLIST.

Discussed with and thanks to <bsiegert>!

Revision 1.46 / (download) - annotate - [select for diffs], Tue Oct 2 18:19:56 2018 UTC (23 months, 3 weeks ago) by bsiegert
Branch: MAIN
Changes since 1.45: +2 -2 lines
Diff to previous 1.45 (colored)

Update go111 to 1.11.1.

go1.11.1 (released 2018/10/01) includes fixes to the compiler, documentation,
go command, runtime, and the crypto/x509, encoding/json, go/types, net,
net/http, and reflect packages. See the Go 1.11.1 milestone on our issue
tracker for details.

Also correct the PLIST and use ln -sf instead of ln -s.

Revision 1.45 / (download) - annotate - [select for diffs], Sat Sep 22 19:44:21 2018 UTC (2 years ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2018Q3-base, pkgsrc-2018Q3
Changes since 1.44: +15 -2 lines
Diff to previous 1.44 (colored)

Move most of the version selection logic into version.mk.

Provide a new variable, GO_PACKAGE_DEP, with the correct dependency on
the user-selected Go version, to be used for fixing syncthing and friends.

Revision 1.44 / (download) - annotate - [select for diffs], Tue Sep 18 20:52:11 2018 UTC (2 years ago) by bsiegert
Branch: MAIN
Changes since 1.43: +3 -2 lines
Diff to previous 1.43 (colored)

Add a versioned Go 1.10 package as lang/go110.

This uses a similar approach as go111. Its revision is one higher than
the existing lang/go.

Next steps:
 - make builds use this for dependent packages
 - delete lang/go to complete the move

Revision 1.43 / (download) - annotate - [select for diffs], Tue Sep 18 16:22:14 2018 UTC (2 years ago) by bsiegert
Branch: MAIN
Changes since 1.42: +2 -1 lines
Diff to previous 1.42 (colored)

Add Go 1.11 as lang/go111.

This installs the go tool as go111; all the supporting files go under
$PREFIX/go111, so it does not conflict with other Go versions. Go packages
in pkgsrc do not use it to build yet.

Changes:

There are many changes and improvements to the toolchain, runtime, and
libraries, but two features stand out as being especially exciting: modules
and WebAssembly support.

This release adds preliminary support for a new concept called "modules," an
alternative to GOPATH with integrated support for versioning and package
distribution. Module support is considered experimental, and there are still
a few rough edges to smooth out, so please make liberal use of the issue
tracker.

Go 1.11 also adds an experimental port to WebAssembly (js/wasm). This allows
programmers to compile Go programs to a binary format compatible with four
major web browsers.

Revision 1.42 / (download) - annotate - [select for diffs], Mon Aug 27 15:01:09 2018 UTC (2 years ago) by bsiegert
Branch: MAIN
Changes since 1.41: +2 -2 lines
Diff to previous 1.41 (colored)

Update Go to 1.10.4.

go1.10.4 (released 2018/08/24) includes fixes to the go command, linker, and
the net/http, mime/multipart, ld/macho, bytes, and strings packages. See the
Go 1.10.4 milestone on our issue tracker for details.

pkgsrc note: After the import of Go 1.11, this package will be renamed to
lang/go110.

Revision 1.41 / (download) - annotate - [select for diffs], Sun Jul 8 18:40:40 2018 UTC (2 years, 2 months ago) by bsiegert
Branch: MAIN
Changes since 1.40: +2 -2 lines
Diff to previous 1.40 (colored)

Update go19 to 1.9.7, latest on that branch.

go1.9.5 (released 2018/03/28) includes fixes to the compiler, go command, and
net/http/pprof package. See the Go 1.9.5 milestone on our issue tracker for
details.

go1.9.6 (released 2018/05/01) includes fixes to the compiler and go command.
See the Go 1.9.6 milestone on our issue tracker for details.

go1.9.7 (released 2018/06/05) includes fixes to the go command, and the
crypto/x509, and strings packages. In particular, it adds minimal support to
the go command for the vgo transition. See the Go 1.9.7 milestone on our issue
tracker for details.

Revision 1.40 / (download) - annotate - [select for diffs], Sun Jul 8 18:00:56 2018 UTC (2 years, 2 months ago) by bsiegert
Branch: MAIN
Changes since 1.39: +2 -1 lines
Diff to previous 1.39 (colored)

Forgot this in the last commit. Add GO19_VERSION.

Revision 1.39 / (download) - annotate - [select for diffs], Sun Jul 8 13:53:42 2018 UTC (2 years, 2 months ago) by bsiegert
Branch: MAIN
Changes since 1.38: +5 -1 lines
Diff to previous 1.38 (colored)

Move definition of $GO to version.mk.

We have some packages, like mongodb-tools, that cannot include go-package.mk
but need to call the go tool.

Revision 1.38 / (download) - annotate - [select for diffs], Tue Jun 12 17:37:59 2018 UTC (2 years, 3 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2018Q2-base, pkgsrc-2018Q2
Changes since 1.37: +2 -2 lines
Diff to previous 1.37 (colored)

Update Go to 1.10.3.

go1.10.3 (released 2018/06/05) includes fixes to the go command, and the
crypto/tls, crypto/x509, and strings packages. In particular, it adds minimal
support to the go command for the vgo transition. See the Go 1.10.3 milestone
on our issue tracker for details.

Revision 1.37 / (download) - annotate - [select for diffs], Fri May 4 18:07:40 2018 UTC (2 years, 4 months ago) by bsiegert
Branch: MAIN
Changes since 1.36: +2 -2 lines
Diff to previous 1.36 (colored)

Update Go to 1.10.2.

As far as I can see, only non-security-relevant bugfixes.

go1.10.2 (released 2018/05/01) includes fixes to the compiler, linker, and go
command. See the Go 1.10.2 milestone on our issue tracker for details.

Revision 1.36 / (download) - annotate - [select for diffs], Fri Mar 30 11:52:18 2018 UTC (2 years, 5 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2018Q1-base, pkgsrc-2018Q1
Changes since 1.35: +2 -2 lines
Diff to previous 1.35 (colored)

Update Go to 1.10.1.

This fixes a security issue (https://github.com/golang/go/issues/23867).
Also:
These releases include fixes to the compiler, runtime, go command, and the
archive/zip, crypto/tls, crypto/x509, encoding/json, net, net/http, and
net/http/pprof packages.

ok wiz@ for committing during freeze

Revision 1.35 / (download) - annotate - [select for diffs], Sun Mar 4 12:54:06 2018 UTC (2 years, 6 months ago) by bsiegert
Branch: MAIN
Changes since 1.34: +2 -2 lines
Diff to previous 1.34 (colored)

Update Go to 1.10. Via wip.

Full release notes at https://golang.org/doc/go1.10.

The latest Go release, version 1.10, arrives six months after Go 1.9. Most of
its changes are in the implementation of the toolchain, runtime, and libraries.
As always, the release maintains the Go 1 promise of compatibility. We expect
almost all Go programs to continue to compile and run as before.

This release improves caching of built packages, adds caching of successful
test results, runs vet automatically during tests, and permits passing string
values directly between Go and C using cgo. A new compiler option whitelist may
cause unexpected invalid flag errors in code that built successfully with older
releases.


As announced in the Go 1.9 release notes, Go 1.10 now requires FreeBSD 10.3 or
later; support for FreeBSD 9.3 has been removed.

Go now runs on NetBSD again but requires the unreleased NetBSD 8. Only GOARCH
amd64 and 386 have been fixed. The arm port is still broken.

On 32-bit MIPS systems, the new environment variable settings GOMIPS=hardfloat
(the default) and GOMIPS=softfloat select whether to use hardware instructions
or software emulation for floating-point computations.

Go 1.10 is the last release that will run on OpenBSD 6.0. Go 1.11 will require
OpenBSD 6.2.

Go 1.10 is the last release that will run on OS X 10.8 Mountain Lion or OS X
10.9 Mavericks. Go 1.11 will require OS X 10.10 Yosemite or later.

Go 1.10 is the last release that will run on Windows XP or Windows Vista. Go
1.11 will require Windows 7 or later.

Revision 1.30.2.1 / (download) - annotate - [select for diffs], Sat Feb 24 11:16:59 2018 UTC (2 years, 7 months ago) by spz
Branch: pkgsrc-2017Q4
Changes since 1.30: +9 -4 lines
Diff to previous 1.30 (colored) next main 1.31 (colored)

Pullup ticket #5703 - requested by bsiegert
lang/go: security update

Revisions pulled up:
- lang/go/Makefile                                              1.59-1.60
- lang/go/PLIST                                                 1.35-1.38
- lang/go/distinfo                                              1.54-1.57
- lang/go/patches/patch-src_cmd_dist_util.go                    1.1
- lang/go/patches/patch-src_cmd_link_internal_ld_elf.go         1.1-1.2
- lang/go/patches/patch-src_runtime_os__netbsd.go               1.3
- lang/go/patches/patch-src_runtime_rt0__netbsd__arm.s          1.1
- lang/go/version.mk                                            1.31-1.32,1.34

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	christos
   Date:		Sat Jan 20 16:55:06 UTC 2018

   Modified Files:
   	pkgsrc/lang/go: Makefile PLIST distinfo version.mk
   Added Files:
   	pkgsrc/lang/go/patches: patch-src_cmd_dist_util.go
   	    patch-src_cmd_link_internal_ld_elf.go
   	    patch-src_runtime_os__netbsd.go
   	    patch-src_runtime_rt0__netbsd__arm.s

   Log Message:
   Add Yasushi Oshima patches for arm from:
       https://github.com/oshimaya/pkgsrc/tree/master/lang/go


   To generate a diff of this commit:
   cvs rdiff -u -r1.58 -r1.59 pkgsrc/lang/go/Makefile
   cvs rdiff -u -r1.34 -r1.35 pkgsrc/lang/go/PLIST
   cvs rdiff -u -r1.53 -r1.54 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.30 -r1.31 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r0 -r1.1 pkgsrc/lang/go/patches/patch-src_cmd_dist_util.go \
       pkgsrc/lang/go/patches/patch-src_cmd_link_internal_ld_elf.go \
       pkgsrc/lang/go/patches/patch-src_runtime_rt0__netbsd__arm.s
   cvs rdiff -u -r0 -r1.3 pkgsrc/lang/go/patches/patch-src_runtime_os__netbsd.go

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	ryoon
   Date:		Sun Jan 21 01:28:39 UTC 2018

   Modified Files:
   	pkgsrc/lang/go: PLIST

   Log Message:
   Fix packaging


   To generate a diff of this commit:
   cvs rdiff -u -r1.35 -r1.36 pkgsrc/lang/go/PLIST

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	christos
   Date:		Sat Jan 20 18:13:25 UTC 2018

   Modified Files:
   	pkgsrc/lang/go: distinfo
   	pkgsrc/lang/go/patches: patch-src_cmd_link_internal_ld_elf.go

   Log Message:
   fix the path


   To generate a diff of this commit:
   cvs rdiff -u -r1.54 -r1.55 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.1 -r1.2 \
       pkgsrc/lang/go/patches/patch-src_cmd_link_internal_ld_elf.go

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	bsiegert
   Date:		Sun Jan 28 11:31:03 UTC 2018

   Modified Files:
   	pkgsrc/lang/go: Makefile PLIST distinfo version.mk

   Log Message:
   Update Go to 1.9.3.

   This release includes fixes to the compiler, runtime, and the database/sql,
   math/big, net/http, and net/url packages.

   View the release notes for more information:
        https://golang.org/doc/devel/release.html#go1.9.minor


   To generate a diff of this commit:
   cvs rdiff -u -r1.59 -r1.60 pkgsrc/lang/go/Makefile
   cvs rdiff -u -r1.36 -r1.37 pkgsrc/lang/go/PLIST
   cvs rdiff -u -r1.55 -r1.56 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.31 -r1.32 pkgsrc/lang/go/version.mk

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	bsiegert
   Date:		Thu Feb  8 19:32:17 UTC 2018

   Modified Files:
   	pkgsrc/lang/go: PLIST distinfo version.mk

   Log Message:
   Update Go to 1.9.4.

   By using the clang or gcc plugin mechanism, it was possible for an attacker to
   trick the ◊»o get„ŗcommand into executing arbitrary code. The go command now
   restricts the set of allowed host compiler and linker arguments in cgo source
   files to a list of allowed flags, in particular disallowing -fplugin= and
   -plugin=.

   The issue is CVE-2018-6574 and Go issue golang.org/issue/23672. See the Go
   issue for details.

   Thanks to Christopher Brown of Mattermost for reporting this problem.


   To generate a diff of this commit:
   cvs rdiff -u -r1.37 -r1.38 pkgsrc/lang/go/PLIST
   cvs rdiff -u -r1.56 -r1.57 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.33 -r1.34 pkgsrc/lang/go/version.mk

Revision 1.34 / (download) - annotate - [select for diffs], Thu Feb 8 19:32:17 2018 UTC (2 years, 7 months ago) by bsiegert
Branch: MAIN
Changes since 1.33: +2 -2 lines
Diff to previous 1.33 (colored)

Update Go to 1.9.4.

By using the clang or gcc plugin mechanism, it was possible for an attacker to
trick the „ŗ◊»o get„ŗcommand into executing arbitrary code. The go command now
restricts the set of allowed host compiler and linker arguments in cgo source
files to a list of allowed flags, in particular disallowing -fplugin= and
-plugin=.

The issue is CVE-2018-6574 and Go issue golang.org/issue/23672. See the Go
issue for details.

Thanks to Christopher Brown of Mattermost for reporting this problem.

Revision 1.33 / (download) - annotate - [select for diffs], Tue Jan 30 17:05:21 2018 UTC (2 years, 7 months ago) by jperkin
Branch: MAIN
Changes since 1.32: +3 -1 lines
Diff to previous 1.32 (colored)

go*: Disable SSP support completely.

It's not supported by the go linker, and can cause issues when building
third-party modules if the SSP libraries are handled by pkgsrc.

Revision 1.32 / (download) - annotate - [select for diffs], Sun Jan 28 11:31:03 2018 UTC (2 years, 7 months ago) by bsiegert
Branch: MAIN
Changes since 1.31: +2 -2 lines
Diff to previous 1.31 (colored)

Update Go to 1.9.3.

This release includes fixes to the compiler, runtime, and the database/sql,
math/big, net/http, and net/url packages.

View the release notes for more information:
     https://golang.org/doc/devel/release.html#go1.9.minor

Revision 1.31 / (download) - annotate - [select for diffs], Sat Jan 20 16:55:05 2018 UTC (2 years, 8 months ago) by christos
Branch: MAIN
Changes since 1.30: +8 -3 lines
Diff to previous 1.30 (colored)

Add Yasushi Oshima patches for arm from:
    https://github.com/oshimaya/pkgsrc/tree/master/lang/go

Revision 1.30 / (download) - annotate - [select for diffs], Sat Oct 28 18:20:14 2017 UTC (2 years, 10 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2017Q4-base
Branch point for: pkgsrc-2017Q4
Changes since 1.29: +2 -2 lines
Diff to previous 1.29 (colored)

Update Go to 1.9.2.

This release includes fixes to the compiler, linker, runtime, documentation,
go command, and the crypto/x509, database/sql, log, and net/smtp packages. It
includes a fix to a bug introduced in Go 1.9.1 that broke "go get"
of non-Git repositories under certain conditions.

Revision 1.28.4.1 / (download) - annotate - [select for diffs], Mon Oct 9 12:30:42 2017 UTC (2 years, 11 months ago) by spz
Branch: pkgsrc-2017Q3
Changes since 1.28: +2 -2 lines
Diff to previous 1.28 (colored) next main 1.29 (colored)

Pullup ticket #5565 - requested by sevan
lang/go: security update

Revisions pulled up:
- lang/go/distinfo                                              1.52
- lang/go/version.mk                                            1.29

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Fri Oct  6 18:38:25 UTC 2017

   Modified Files:
           pkgsrc/lang/go: distinfo version.mk

   Log Message:
   Update Go to 1.9.1 (security fix).

   Two security-related issues were recently reported.
   To address this issue, we have just released Go 1.8.4 and Go 1.9.1.

   We recommend that all users update to one of these releases (if you're
   not sure
   which, choose Go 1.9.1).

   The issues addressed by these releases are:

   By nesting a git checkout inside another version control repository, it was
   possible for an attacker to trick the "go get" command into executing
   arbitrary
   code. The go command now refuses to use version control checkouts found
   inside
   other version control systems, with an exception for git submodules (git
   inside
   git).
   The issue is tracked as https://golang.org/issue/22125 (Go 1.8.4) and
   https://golang.org/issue/22131 (Go 1.9.1). Fixes are linked from the issues.
   Thanks to Simon Rawet for the report.

   In the smtp package, PlainAuth is documented as sending credentials only
   over
   authenticated, encrypted TLS connections, but it was changed in Go 1.1
   to also
   send credentials on non-TLS connections when the remote server
   advertises that
   PLAIN authentication is supported. The change was meant to allow use of
   PLAIN
   authentication on localhost, but it has the effect of allowing a
   man-in-the-middle attacker to harvest credentials. PlainAuth now requires
   either TLS or a localhost connection before sending credentials,
   regardless of
   what the remote server claims.
   This issue is tracked as https://golang.org/issue/22134 (Go 1.8.4) and
   https://golang.org/issue/22133 (Go 1.9.1). Fixes are linked from the issues.
   Thanks to Stevie Johnstone for the report.


   To generate a diff of this commit:
   cvs rdiff -u -r1.51 -r1.52 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.28 -r1.29 pkgsrc/lang/go/version.mk

Revision 1.29 / (download) - annotate - [select for diffs], Fri Oct 6 18:38:25 2017 UTC (2 years, 11 months ago) by bsiegert
Branch: MAIN
Changes since 1.28: +2 -2 lines
Diff to previous 1.28 (colored)

Update Go to 1.9.1 (security fix).

Two security-related issues were recently reported.
To address this issue, we have just released Go 1.8.4 and Go 1.9.1.

We recommend that all users update to one of these releases (if you're not sure
which, choose Go 1.9.1).

The issues addressed by these releases are:

By nesting a git checkout inside another version control repository, it was
possible for an attacker to trick the "go get" command into executing arbitrary
code. The go command now refuses to use version control checkouts found inside
other version control systems, with an exception for git submodules (git inside
git).
The issue is tracked as https://golang.org/issue/22125 (Go 1.8.4) and
https://golang.org/issue/22131 (Go 1.9.1). Fixes are linked from the issues.
Thanks to Simon Rawet for the report.

In the smtp package, PlainAuth is documented as sending credentials only over
authenticated, encrypted TLS connections, but it was changed in Go 1.1 to also
send credentials on non-TLS connections when the remote server advertises that
PLAIN authentication is supported. The change was meant to allow use of PLAIN
authentication on localhost, but it has the effect of allowing a
man-in-the-middle attacker to harvest credentials. PlainAuth now requires
either TLS or a localhost connection before sending credentials, regardless of
what the remote server claims.
This issue is tracked as https://golang.org/issue/22134 (Go 1.8.4) and
https://golang.org/issue/22133 (Go 1.9.1). Fixes are linked from the issues.
Thanks to Stevie Johnstone for the report.

Revision 1.28 / (download) - annotate - [select for diffs], Sun Sep 3 07:12:07 2017 UTC (3 years ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2017Q3-base
Branch point for: pkgsrc-2017Q3
Changes since 1.27: +2 -2 lines
Diff to previous 1.27 (colored)

Update Go to 1.9.

The latest Go release, version 1.9, arrives six months after Go 1.8 and
is the tenth release in the Go 1.x series. There are two changes to the
language: adding support for type aliases and defining when
implementations may fuse floating point operations. Most of the changes
are in the implementation of the toolchain, runtime, and libraries. As
always, the release maintains the Go 1 promise of compatibility. We
expect almost all Go programs to continue to compile and run as before.

The release adds transparent monotonic time support, parallelizes
compilation of functions within a package, better supports test helper
functions, includes a new bit manipulation package, and has a new
concurrent map type.


There are some instabilities on FreeBSD that are known but not
understood. These can lead to program crashes in rare cases. See issue
15658. Any help in solving this FreeBSD-specific issue would be
appreciated.

Go stopped running NetBSD builders during the Go 1.9 development cycle
due to NetBSD kernel crashes, up to and including NetBSD 7.1. As Go 1.9
is being released, NetBSD 7.1.1 is being released with a fix. However,
at this time we have no NetBSD builders passing our test suite. Any help
investigating the various NetBSD issues would be appreciated.

Revision 1.23.2.2 / (download) - annotate - [select for diffs], Thu May 25 21:11:03 2017 UTC (3 years, 4 months ago) by spz
Branch: pkgsrc-2017Q1
Changes since 1.23.2.1: +1 -1 lines
Diff to previous 1.23.2.1 (colored) to branchpoint 1.23 (colored) next main 1.24 (colored)

Pullup ticket #5433 - requested by bsiegert
lang/go: security update

Revisions pulled up:
- lang/go/Makefile                                              1.52
- lang/go/distinfo                                              1.49
- lang/go/version.mk                                            1.26
- lang/go/PLIST                                                 1.31

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	bsiegert
   Date:		Thu May 25 09:06:43 UTC 2017

   Modified Files:
   	pkgsrc/lang/go: Makefile distinfo version.mk

   Log Message:
   SECURITY: Update Go to 1.8.2, fixing CVE-2017-8932,
   carry bug in x86-64 P-256.

   A security-related issue was recently reported in Go's crypto/elliptic package.
   To address this issue, we have just released Go 1.7.6 and Go 1.8.2.

   The Go team would like to thank Vlad Krasnov and Filippo Valsorda at Cloudflare
   for reporting the issue and providing a fix.

   The issue affects Go's P-256 implementation on the 64-bit x86 architecture.

   This is CVE-2017-8932 and was addressed by this change:
   https://golang.org/cl/41070, tracked in this issue:
   https://golang.org/issue/20040


   To generate a diff of this commit:
   cvs rdiff -u -r1.51 -r1.52 pkgsrc/lang/go/Makefile
   cvs rdiff -u -r1.48 -r1.49 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.25 -r1.26 pkgsrc/lang/go/version.mk

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	wen
   Date:		Sun Apr  9 08:23:43 UTC 2017

   Modified Files:
   	pkgsrc/lang/go: PLIST distinfo version.mk

   Log Message:
   Update to 1.8.1

   Upstream changes:
   go1.8.1 (released 2017/04/07) includes fixes to the compiler, linker, runtime,
   +documentation, go command and the crypto/tls, encoding/xml, image/png, net,
   +net/http, reflect, text/template, and time packages. See the Go 1.8.1 milestone
   +on our issue tracker for details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.30 -r1.31 pkgsrc/lang/go/PLIST
   cvs rdiff -u -r1.44 -r1.45 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.23 -r1.24 pkgsrc/lang/go/version.mk

Revision 1.27 / (download) - annotate - [select for diffs], Thu May 25 09:24:21 2017 UTC (3 years, 4 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2017Q2-base, pkgsrc-2017Q2
Changes since 1.26: +2 -2 lines
Diff to previous 1.26 (colored)

Update Go to 1.8.3, a non-security release.

This release includes fixes to the compiler, runtime, documentation, and the
database/sql package.
    https://golang.org/doc/devel/release.html#go1.8.minor

It also includes the security fix to the crypto/elliptic package from Go 1.8.2.

Revision 1.26 / (download) - annotate - [select for diffs], Thu May 25 09:06:43 2017 UTC (3 years, 4 months ago) by bsiegert
Branch: MAIN
Changes since 1.25: +2 -2 lines
Diff to previous 1.25 (colored)

SECURITY: Update Go to 1.8.2, fixing CVE-2017-8932,
carry bug in x86-64 P-256.

A security-related issue was recently reported in Go's crypto/elliptic package.
To address this issue, we have just released Go 1.7.6 and Go 1.8.2.

The Go team would like to thank Vlad Krasnov and Filippo Valsorda at Cloudflare
for reporting the issue and providing a fix.

The issue affects Go's P-256 implementation on the 64-bit x86 architecture.

This is CVE-2017-8932 and was addressed by this change:
https://golang.org/cl/41070, tracked in this issue:
https://golang.org/issue/20040

Revision 1.23.2.1 / (download) - annotate - [select for diffs], Mon May 1 09:55:46 2017 UTC (3 years, 4 months ago) by bsiegert
Branch: pkgsrc-2017Q1
Changes since 1.23: +2 -2 lines
Diff to previous 1.23 (colored)

Pullup ticket #5392 - requested by sevan
lang/go: build fix

Revisions pulled up:
- lang/go/version.mk                                            1.25

---
   Module Name:    pkgsrc
   Committed By:   maya
   Date:           Sun Apr 30 23:02:09 UTC 2017

   Modified Files:
           pkgsrc/lang/go: version.mk

   Log Message:
   go: match even more ARM with wildcards

   part 1 of PR pkg/52178 from aikchar

Revision 1.25 / (download) - annotate - [select for diffs], Sun Apr 30 23:02:09 2017 UTC (3 years, 4 months ago) by maya
Branch: MAIN
Changes since 1.24: +2 -2 lines
Diff to previous 1.24 (colored)

go: match even more ARM with wildcards

part 1 of PR pkg/52178 from aikchar

Revision 1.24 / (download) - annotate - [select for diffs], Sun Apr 9 08:23:43 2017 UTC (3 years, 5 months ago) by wen
Branch: MAIN
Changes since 1.23: +2 -2 lines
Diff to previous 1.23 (colored)

Update to 1.8.1

Upstream changes:
go1.8.1 (released 2017/04/07) includes fixes to the compiler, linker, runtime, documentation, go command and the crypto/tls, encoding/xml, image/png, net, net/http, reflect, text/template, and time packages. See the Go 1.8.1 milestone on our issue tracker for details.

Revision 1.23 / (download) - annotate - [select for diffs], Wed Mar 15 19:38:09 2017 UTC (3 years, 6 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2017Q1-base
Branch point for: pkgsrc-2017Q1
Changes since 1.22: +2 -2 lines
Diff to previous 1.22 (colored)

Update Go to 1.8.

The compiler back end introduced in Go 1.7 for 64-bit x86 is now used on all
architectures, and those architectures should see significant performance
improvements. For instance, the CPU time required by our benchmark programs was
reduced by 20-30% on 32-bit ARM systems. There are also some modest performance
improvements in this release for 64-bit x86 systems. The compiler and linker
have been made faster. Compile times should be improved by about 15% over Go
1.7. There is still more work to be done in this area: expect faster
compilation speeds in future releases.

Garbage collection pauses should be significantly shorter, usually under 100
microseconds and often as low as 10 microseconds.

The HTTP server adds support for HTTP/2 Push, allowing servers to preemptively
send responses to a client. This is useful for minimizing network latency by
eliminating roundtrips. The HTTP server also adds support for graceful
shutdown, allowing servers to minimize downtime by shutting down only after
serving all requests that are in flight.

Contexts (added to the standard library in Go 1.7) provide a cancelation and
timeout mechanism. Go 1.8 adds support for contexts in more parts of the
standard library, including the database/sql and net packages and
Server.Shutdown in the net/http package.

Go 1.8 includes many more additions, improvements, and fixes. Find the complete
set of changes, and more information about the improvements listed above, in
the Go 1.8 release notes: https://golang.org/doc/go1.8

Revision 1.22 / (download) - annotate - [select for diffs], Mon Jan 30 03:04:53 2017 UTC (3 years, 7 months ago) by wen
Branch: MAIN
Changes since 1.21: +2 -2 lines
Diff to previous 1.21 (colored)

Update to 1.7.5

Upstream changes:
go1.7.5 (released 2017/01/26) includes fixes to the compiler, runtime, and the crypto/x509 and time packages. See the Go 1.7.5 milestone on our issue tracker for details.

Revision 1.17.2.1 / (download) - annotate - [select for diffs], Mon Dec 12 06:50:02 2016 UTC (3 years, 9 months ago) by spz
Branch: pkgsrc-2016Q3
Changes since 1.17: +2 -2 lines
Diff to previous 1.17 (colored) next main 1.18 (colored)

Pullup ticket #5170 - requested by bsiegert
lang/go: security update

Revisions pulled up:
- lang/go/Makefile                                              1.48
- lang/go/PLIST                                                 1.28
- lang/go/distinfo                                              1.42,1.41
- lang/go/patches/patch-src_net_http_h2__bundle.go              deleted
- lang/go/version.mk                                            1.21,1.18

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Sun Dec  4 16:08:55 UTC 2016

   Modified Files:
           pkgsrc/lang/go: distinfo version.mk

   Log Message:
   Update Go to 1.7.4.

   Two security-related issues were recently reported, and to address these issues
   we have just released Go 1.6.4 and Go 1.7.4.

   We recommend that all users update to one of these releases (if you're not sure
   which, choose Go 1.7.4).

   The issues addressed by these releases are:

   On Darwin, user's trust preferences for root certificates were not honored. If
   the user had a root certificate loaded in their Keychain that was explicitly
   not trusted, a Go program would still verify a connection using that root
   certificate.  This is addressed by https://golang.org/cl/33721, tracked in
   https://golang.org/issue/18141.
   Thanks to Xy Ziemba for identifying and reporting this issue.

   The net/http package's Request.ParseMultipartForm method starts writing to
   temporary files once the request body size surpasses the given "maxMemory"
   limit. It was possible for an attacker to generate a multipart request crafted
   such that the server ran out of file descriptors.  This is addressed by
   https://golang.org/cl/30410, tracked in https://golang.org/issue/17965.
   Thanks to Simon Rawet for the report.


   To generate a diff of this commit:
   cvs rdiff -u -r1.41 -r1.42 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.20 -r1.21 pkgsrc/lang/go/version.mk

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Thu Oct 27 18:58:00 UTC 2016

   Modified Files:
           pkgsrc/lang/go: Makefile PLIST distinfo version.mk
   Removed Files:
           pkgsrc/lang/go/patches: patch-src_net_http_h2__bundle.go

   Log Message:
   Update Go to 1.7.3.

   go1.7.2 should not be used. It was tagged but not fully released. The release
   was deferred due to a last minute bug report. Use go1.7.3 instead, and refer to
   the summary of changes below.

   go1.7.3 (released 2016/10/19) includes fixes to the compiler, runtime, and the
   crypto/cipher, crypto/tls, net/http, and strings packages. See the Go 1.7.3
   milestone on our issue tracker for details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.47 -r1.48 pkgsrc/lang/go/Makefile
   cvs rdiff -u -r1.27 -r1.28 pkgsrc/lang/go/PLIST
   cvs rdiff -u -r1.40 -r1.41 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.17 -r1.18 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.1 -r0 \
       pkgsrc/lang/go/patches/patch-src_net_http_h2__bundle.go

Revision 1.21 / (download) - annotate - [select for diffs], Sun Dec 4 16:08:55 2016 UTC (3 years, 9 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2016Q4-base, pkgsrc-2016Q4
Changes since 1.20: +2 -2 lines
Diff to previous 1.20 (colored)

Update Go to 1.7.4.

Two security-related issues were recently reported, and to address these issues
we have just released Go 1.6.4 and Go 1.7.4.

We recommend that all users update to one of these releases (if you're not sure
which, choose Go 1.7.4).

The issues addressed by these releases are:

On Darwin, user's trust preferences for root certificates were not honored. If
the user had a root certificate loaded in their Keychain that was explicitly
not trusted, a Go program would still verify a connection using that root
certificate.  This is addressed by https://golang.org/cl/33721, tracked in
https://golang.org/issue/18141.
Thanks to Xy Ziemba for identifying and reporting this issue.

The net/http package's Request.ParseMultipartForm method starts writing to
temporary files once the request body size surpasses the given "maxMemory"
limit. It was possible for an attacker to generate a multipart request crafted
such that the server ran out of file descriptors.  This is addressed by
https://golang.org/cl/30410, tracked in https://golang.org/issue/17965.
Thanks to Simon Rawet for the report.

Revision 1.20 / (download) - annotate - [select for diffs], Fri Dec 2 20:26:01 2016 UTC (3 years, 9 months ago) by maya
Branch: MAIN
Changes since 1.19: +2 -2 lines
Diff to previous 1.19 (colored)

go: more wildcards for arm

my rpi1's machine_platform is ..-earmv6hf and needs this to match

Revision 1.19 / (download) - annotate - [select for diffs], Sun Nov 27 21:07:21 2016 UTC (3 years, 9 months ago) by maya
Branch: MAIN
Changes since 1.18: +3 -3 lines
Diff to previous 1.18 (colored)

go: match more netbsd/arm, which can be machine arch earm,
and not just evbarm.

PR pkg/51653

Note that this does not resolve the PR, as the build hangs.

Revision 1.18 / (download) - annotate - [select for diffs], Thu Oct 27 18:58:00 2016 UTC (3 years, 10 months ago) by bsiegert
Branch: MAIN
Changes since 1.17: +2 -2 lines
Diff to previous 1.17 (colored)

Update Go to 1.7.3.

go1.7.2 should not be used. It was tagged but not fully released. The release
was deferred due to a last minute bug report. Use go1.7.3 instead, and refer to
the summary of changes below.

go1.7.3 (released 2016/10/19) includes fixes to the compiler, runtime, and the
crypto/cipher, crypto/tls, net/http, and strings packages. See the Go 1.7.3
milestone on our issue tracker for details.

Revision 1.17 / (download) - annotate - [select for diffs], Sat Sep 10 09:09:23 2016 UTC (4 years ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2016Q3-base
Branch point for: pkgsrc-2016Q3
Changes since 1.16: +2 -2 lines
Diff to previous 1.16 (colored)

Update go to 1.7.1.

go1.7.1 (released 2016/09/07) includes fixes to the compiler, runtime,
documentation, and the compress/flate, hash/crc32, io, net, net/http,
path/filepath, reflect, and syscall packages. See the Go 1.7.1 milestone on our
issue tracker for details.

Revision 1.16 / (download) - annotate - [select for diffs], Fri Aug 19 09:38:06 2016 UTC (4 years, 1 month ago) by bsiegert
Branch: MAIN
Changes since 1.15: +2 -2 lines
Diff to previous 1.15 (colored)

Update Go to 1.7.

The latest Go release, version 1.7, arrives six months after 1.6. Most of its
changes are in the implementation of the toolchain, runtime, and libraries.
There is one minor change to the language specification. As always, the release
maintains the Go 1 promise of compatibility. We expect almost all Go programs
to continue to compile and run as before.

There is one tiny language change in this release. The section on terminating
statements clarifies that to determine whether a statement list ends in a
terminating statement, the „ŗ◊«inal non-empty statement„ŗis considered the end,
matching the existing behavior of the gc and gccgo compiler toolchains. In
earlier releases the definition referred only to the „ŗ◊«inal statement,„ŗleaving
the effect of trailing empty statements at the least unclear. The go/types
package has been updated to match the gc and gccgo compiler toolchains in this
respect. This change has no effect on the correctness of existing programs.

Go 1.7 adds support for macOS 10.12 Sierra. This support was backported to Go
1.6.3. Binaries built with versions of Go before 1.6.3 will not work correctly
on Sierra.

Revision 1.14.2.1 / (download) - annotate - [select for diffs], Wed Jul 20 03:02:31 2016 UTC (4 years, 2 months ago) by spz
Branch: pkgsrc-2016Q2
Changes since 1.14: +2 -2 lines
Diff to previous 1.14 (colored) next main 1.15 (colored)

Pullup ticket #5064 - requested by bsiegert
lang/go: security update

Revisions pulled up:
- lang/go/Makefile                                              1.43
- lang/go/distinfo                                              1.37
- lang/go/version.mk                                            1.15

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Mon Jul 18 20:37:40 UTC 2016

   Modified Files:
           pkgsrc/lang/go: Makefile distinfo version.mk

   Log Message:
   Update Go to 1.6.3.

   A security-related issue was recently reported in Go's net/http/cgi =
   package and
   net/http package when used in a CGI environment. Go 1.6.3 and Go 1.7rc2 =
   contain
   a fix for this issue.

   Go versions 1.0-1.6.2 and 1.7rc1 are vulnerable to an input validation =
   flaw in
   the CGI components resulting in the HTTP_PROXY environment variable =
   being set
   by the incoming Proxy header. This environment variable was also used to =
   set
   the outgoing proxy, enabling an attacker to insert a proxy into outgoing
   requests of a CGI program.

   This is CVE-2016-5386 and was addressed by this change:
   https://golang.org/cl/25010, tracked in this issue:
   https://golang.org/issue/16405

   The Go team would like to thank Dominic Scheirlinck for coordinating =
   disclosure
   of this issue across multiple languages and CGI environments. Read more =
   about
   "httpoxy" here: https://httpoxy.org/

   Go 1.6.3 also adds support for macOS Sierra. See =
   https://golang.org/issue/16354
   for details.


   To generate a diff of this commit:
   cvs rdiff -u -r1.42 -r1.43 pkgsrc/lang/go/Makefile
   cvs rdiff -u -r1.36 -r1.37 pkgsrc/lang/go/distinfo
   cvs rdiff -u -r1.14 -r1.15 pkgsrc/lang/go/version.mk

Revision 1.15 / (download) - annotate - [select for diffs], Mon Jul 18 20:37:40 2016 UTC (4 years, 2 months ago) by bsiegert
Branch: MAIN
Changes since 1.14: +2 -2 lines
Diff to previous 1.14 (colored)

Update Go to 1.6.3.

A security-related issue was recently reported in Go's net/http/cgi package and
net/http package when used in a CGI environment. Go 1.6.3 and Go 1.7rc2 contain
a fix for this issue.

Go versions 1.0-1.6.2 and 1.7rc1 are vulnerable to an input validation flaw in
the CGI components resulting in the HTTP_PROXY environment variable being set
by the incoming Proxy header. This environment variable was also used to set
the outgoing proxy, enabling an attacker to insert a proxy into outgoing
requests of a CGI program.

This is CVE-2016-5386 and was addressed by this change:
https://golang.org/cl/25010, tracked in this issue:
https://golang.org/issue/16405

The Go team would like to thank Dominic Scheirlinck for coordinating disclosure
of this issue across multiple languages and CGI environments. Read more about
"httpoxy" here: https://httpoxy.org/

Go 1.6.3 also adds support for macOS Sierra. See https://golang.org/issue/16354
for details.

Revision 1.14 / (download) - annotate - [select for diffs], Sat Apr 30 11:22:28 2016 UTC (4 years, 4 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2016Q2-base
Branch point for: pkgsrc-2016Q2
Changes since 1.13: +2 -2 lines
Diff to previous 1.13 (colored)

Update Go to 1.6.2.

This release includes fixes to the compiler, runtime, tools, documentation, and
the mime/multipart, net/http, and sort packages.

    https://golang.org/doc/devel/release.html#go1.6.minor

Revision 1.13 / (download) - annotate - [select for diffs], Wed Apr 13 07:12:00 2016 UTC (4 years, 5 months ago) by bsiegert
Branch: MAIN
Changes since 1.12: +2 -2 lines
Diff to previous 1.12 (colored)

Update Go to 1.6.1.

Two security-related issues were recently reported, and to address these issues
we have just released Go 1.6.1 and Go 1.5.4.

We recommend that all users update to one of these releases (if you're not sure
which, choose Go 1.6.1).

The issues addressed by these releases are:

On Windows, Go loads system DLLs by name with LoadLibrary, making it vulnerable
to DLL preloading attacks. For instance, if a user runs a Go executable from a
Downloads folder, malicious DLL files also downloaded to that folder could be
loaded into that executable.
This is CVE-2016-3958 and was addressed by this change: https://golang.org/cl/21428
Thanks to Taru Karttunen for identifying this issue.

Go's crypto libraries passed certain parameters unchecked to the underlying big
integer library, possibly leading to extremely long-running computations, which
in turn makes Go programs vulnerable to remote denial of service attacks.
Programs using HTTPS client certificates or the Go SSH server libraries are
both exposed to this vulnerability.
This is CVE-2016-3959 and was addressed by this change: https://golang.org/cl/21533
Thanks to David Wong for identifying this issue.

Revision 1.12 / (download) - annotate - [select for diffs], Tue Feb 23 20:12:25 2016 UTC (4 years, 7 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2016Q1-base, pkgsrc-2016Q1
Changes since 1.11: +2 -2 lines
Diff to previous 1.11 (colored)

Update Go to 1.6.

The latest Go release, version 1.6, arrives six months after 1.5. Most of its
changes are in the implementation of the language, runtime, and libraries.
There are no changes to the language specification. As always, the release
maintains the Go 1 promise of compatibility. We expect almost all Go programs
to continue to compile and run as before.

The release adds new ports to Linux on 64-bit MIPS and Android on 32-bit x86;
defined and enforced rules for sharing Go pointers with C; transparent,
automatic support for HTTP/2; and a new mechanism for template reuse.

Full changelog at https://golang.org/doc/go1.6.

Revision 1.11 / (download) - annotate - [select for diffs], Sat Jan 16 09:43:44 2016 UTC (4 years, 8 months ago) by fhajny
Branch: MAIN
Changes since 1.10: +2 -2 lines
Diff to previous 1.10 (colored)

Update lang/go to 1.5.3.

This is a security-related release, it fixes CVE-2015-8618 that was
partically patched in 1.5.2nb1.

See full release notes for a description:

https://groups.google.com/d/msg/golang-announce/MEATuOi_ei4/JsndUuZwEAAJ

Revision 1.10 / (download) - annotate - [select for diffs], Thu Dec 10 20:04:54 2015 UTC (4 years, 9 months ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2015Q4-base, pkgsrc-2015Q4
Changes since 1.9: +2 -2 lines
Diff to previous 1.9 (colored)

Update Go to 1.5.2, original patch from Kamel Derouiche in PR pkg/50498.

go1.5.2 (released 2015/12/02) includes bug fixes to the compiler,
linker, and the mime/multipart, net, and runtime packages. See the Go
1.5.2 milestone on our issue tracker for details.

https://github.com/golang/go/issues?q=milestone%3AGo1.5.2

Revision 1.8.2.1 / (download) - annotate - [select for diffs], Tue Oct 6 16:37:05 2015 UTC (4 years, 11 months ago) by spz
Branch: pkgsrc-2015Q3
Changes since 1.8: +2 -2 lines
Diff to previous 1.8 (colored) next main 1.9 (colored)

Pullup ticket #4819 - requested by bsiegert
lang/go14: security update

Revisions pulled up:
- lang/go/version.mk                                            1.9
- lang/go14/Makefile                                            1.5
- lang/go14/PLIST                                               1.2
- lang/go14/distinfo                                            1.3

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   tnn
   Date:           Sun Sep 27 00:36:02 UTC 2015

   Modified Files:
           pkgsrc/lang/go14: Makefile

   Log Message:
   more REPLACE_BASH


   To generate a diff of this commit:
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/lang/go14/Makefile

-------------------------------------------------------------------
   Module Name:    pkgsrc
   Committed By:   bsiegert
   Date:           Sat Sep 26 17:37:01 UTC 2015

   Modified Files:
           pkgsrc/lang/go: version.mk
           pkgsrc/lang/go14: Makefile PLIST distinfo

   Log Message:
   Update go14 to 1.4.3. It fixes four security-related issues.

   The issues were reported in Go's net/http package. They affect programs usi=
   ng
   that package to proxy HTTP requests. We recommend that all users upgrade to=
    Go
   1.5, which fixes these issues. For users unable to upgrade to Go 1.5, we ha=
   ve
   released version 1.4.3, which is based on Go 1.4.2 plus fixes for these iss=
   ues.
   Affected Go programs=E2=80=94those that use the net/http package as a proxy=
    server=E2=80=94must
   be recompiled with Go 1.5 or Go 1.4.3 to receive the fixes.

   The CVE issue descriptions and fixes are linked below.

   CVE-2015-5739
   "Content Length" treated as valid header:
   https://go-review.googlesource.com/#/c/11772/

   CVE-2015-5740
   Double content-length headers does not return 400 error:
   https://go-review.googlesource.com/#/c/11810/

   CVE-2015-5741
   Additional hardening, not sending Content-Length w/Transfer-Encoding,
   Closing connections:
   https://go-review.googlesource.com/#/c/11810/
   https://go-review.googlesource.com/#/c/12865/
   https://go-review.googlesource.com/#/c/13148/

   The Go team would like to thank Jed Denlea and R=C3=A9gis Leroy for their
   contributions to this release. They have been awarded 1337 USD under the Go=
   ogle
   Security Bounty program.


   To generate a diff of this commit:
   cvs rdiff -u -r1.8 -r1.9 pkgsrc/lang/go/version.mk
   cvs rdiff -u -r1.3 -r1.4 pkgsrc/lang/go14/Makefile
   cvs rdiff -u -r1.1 -r1.2 pkgsrc/lang/go14/PLIST
   cvs rdiff -u -r1.2 -r1.3 pkgsrc/lang/go14/distinfo

Revision 1.9 / (download) - annotate - [select for diffs], Sat Sep 26 17:37:01 2015 UTC (5 years ago) by bsiegert
Branch: MAIN
Changes since 1.8: +2 -2 lines
Diff to previous 1.8 (colored)

Update go14 to 1.4.3. It fixes four security-related issues.

The issues were reported in Go's net/http package. They affect programs using
that package to proxy HTTP requests. We recommend that all users upgrade to Go
1.5, which fixes these issues. For users unable to upgrade to Go 1.5, we have
released version 1.4.3, which is based on Go 1.4.2 plus fixes for these issues.
Affected Go programs„ŗ«’hose that use the net/http package as a proxy server„ŗ«őust
be recompiled with Go 1.5 or Go 1.4.3 to receive the fixes.

The CVE issue descriptions and fixes are linked below.

CVE-2015-5739
"Content Length" treated as valid header:
https://go-review.googlesource.com/#/c/11772/

CVE-2015-5740
Double content-length headers does not return 400 error:
https://go-review.googlesource.com/#/c/11810/

CVE-2015-5741
Additional hardening, not sending Content-Length w/Transfer-Encoding,
Closing connections:
https://go-review.googlesource.com/#/c/11810/
https://go-review.googlesource.com/#/c/12865/
https://go-review.googlesource.com/#/c/13148/

The Go team would like to thank Jed Denlea and Régis Leroy for their
contributions to this release. They have been awarded 1337 USD under the Google
Security Bounty program.

Revision 1.8 / (download) - annotate - [select for diffs], Sun Sep 13 14:24:58 2015 UTC (5 years ago) by bsiegert
Branch: MAIN
CVS Tags: pkgsrc-2015Q3-base
Branch point for: pkgsrc-2015Q3
Changes since 1.7: +2 -2 lines
Diff to previous 1.7 (colored)

Update Go to 1.5.1.

go1.5.1 (released 2015/09/08) includes bug fixes to the compiler, assembler,
and the fmt, net/textproto, net/http, and runtime packages. See the Go 1.5.1
milestone on our issue tracker for details:
https://github.com/golang/go/issues?q=milestone%3AGo1.5.1

Revision 1.7 / (download) - annotate - [select for diffs], Sat Aug 22 10:51:20 2015 UTC (5 years, 1 month ago) by bsiegert
Branch: MAIN
Changes since 1.6: +2 -2 lines
Diff to previous 1.6 (colored)

Update go to 1.5.

This release now needs the previous one (lang/go14) to build.

The biggest developments in the implementation are:

* The compiler and runtime are now written entirely in Go (with a little
  assembler). C is no longer involved in the implementation, and so the
  C compiler that was once necessary for building the distribution is
  gone.
* The garbage collector is now concurrent and provides dramatically
  lower pause times by running, when possible, in parallel with other
  goroutines.
* By default, Go programs run with GOMAXPROCS set to the number of cores
  available; in prior releases it defaulted to 1.
* Support for internal packages is now provided for all repositories,
  not just the Go core.
* The go command now provides experimental support for "vendoring"
  external dependencies.
* A new go tool trace command supports fine-grained tracing of program
  execution.
* A new go doc command (distinct from godoc) is customized for
  command-line use.

Full release notes are at https://golang.org/doc/go1.5.

Revision 1.6 / (download) - annotate - [select for diffs], Fri Jul 31 14:46:25 2015 UTC (5 years, 1 month ago) by bsiegert
Branch: MAIN
Changes since 1.5: +2 -1 lines
Diff to previous 1.5 (colored)

Create lang/go14 as a copy of lang/go but which installs under
$PREFIX/go14.

Go 1.5 is going to be released soon, and it will depend on an existing
installation of Go 1.4 to compile. So let's provide one.

Revision 1.5 / (download) - annotate - [select for diffs], Sun Feb 22 13:14:09 2015 UTC (5 years, 7 months ago) by mspo
Branch: MAIN
CVS Tags: pkgsrc-2015Q2-base, pkgsrc-2015Q2, pkgsrc-2015Q1-base, pkgsrc-2015Q1
Changes since 1.4: +2 -2 lines
Diff to previous 1.4 (colored)

go1.4.2 (released 2015/02/17) includes bug fixes to the go command, the compiler and linker, and the runtime, syscall, reflect, and math/big packages.

Revision 1.4 / (download) - annotate - [select for diffs], Fri Jan 16 11:27:03 2015 UTC (5 years, 8 months ago) by wiz
Branch: MAIN
Changes since 1.3: +2 -2 lines
Diff to previous 1.3 (colored)

Update to 1.4.1:

We've just released Go version 1.4.1, a minor point release.  This
release fixes bugs in linker and the log, runtime, and syscall
packages.

Revision 1.3 / (download) - annotate - [select for diffs], Wed Dec 31 11:40:14 2014 UTC (5 years, 8 months ago) by bsiegert
Branch: MAIN
Changes since 1.2: +5 -5 lines
Diff to previous 1.2 (colored)

Remove special case for golang.org/x/tools from the go command.

We handle it differently in the go-tools package. While here, rename
GO_COMPILER to GOCHAR, which is the name upstream uses.

Bump PKGREVISION.

Revision 1.2 / (download) - annotate - [select for diffs], Fri Dec 12 09:41:40 2014 UTC (5 years, 9 months ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2014Q4-base, pkgsrc-2014Q4
Changes since 1.1: +2 -2 lines
Diff to previous 1.1 (colored)

Update to 1.4, ok bsiegert:

Today we announce Go 1.4, the fifth major stable release of Go,
arriving six months after our previous major release Go 1.3. It
contains a small language change, support for more operating systems
and processor architectures, and improvements to the tool chain
and libraries. As always, Go 1.4 keeps the promise of compatibility,
and almost everything will continue to compile and run without
change when moved to 1.4. For the full details, see the Go 1.4
release notes.

The most notable new feature in this release is official support
for Android. Using the support in the core and the libraries in
the golang.org/x/mobile repository, it is now possible to write
simple Android apps using only Go code. At this stage, the support
libraries are still nascent and under heavy development. Early
adopters should expect a bumpy ride, but we welcome the community
to get involved.

The language change is a tweak to the syntax of for-range loops.
You may now write "for range s {" to loop over each item from s,
without having to assign the value, loop index, or map key. See
the release notes for details.

The go command has a new subcommand, go generate, to automate the
running of tools to generate source code before compilation. For
example, it can be used to automate the generation of String methods
for typed constants using the new stringer tool. For more information,
see the design document.

Most programs will run about the same speed or slightly faster in
1.4 than in 1.3; some will be slightly slower. There are many
changes, making it hard to be precise about what to expect. See
the release notes for more discussion.

And, of course, there are many more improvements and bug fixes.

In case you missed it, a few weeks ago the sub-repositories were
moved to new locations. For example, the go.tools packages are now
imported from "golang.org/x/tools". See the announcement post for
details.

This release also coincides with the project's move from Mercurial
to Git (for source control), Rietveld to Gerrit (for code review),
and Google Code to Github (for issue tracking and wiki). The move
affects the core Go repository and its sub-repositories. You can
find the canonical Git repositories at go.googlesource.com, and
the issue tracker and wiki at the golang/go GitHub repo.

Revision 1.1 / (download) - annotate - [select for diffs], Tue Nov 18 20:39:11 2014 UTC (5 years, 10 months ago) by bsiegert
Branch: MAIN

Add a separate Makefile for the version string plus GOARCH. To be used
by Go packages.

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.




CVSweb <webmaster@jp.NetBSD.org>