Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: golang/go
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: go1.20.7
Choose a base ref
...
head repository: golang/go
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: go1.20.8
Choose a head ref
  • 12 commits
  • 31 files changed
  • 7 contributors

Commits on Aug 11, 2023

  1. [release-branch.go1.20] cmd/go: refuse to build Go 1.22 code

    With #60078 accepted, we expect Go 1.22 will have different
    for loop semantics than Go 1.20 did. Once Go 1.22 is released,
    Go 1.20 will be unsupported, but add a check anyway, just to
    help catch some mistakes and usage of old Go toolchains
    beyond their end-of-support.
    
    Note that Go 1.20 can keep being used indefinitely with pre-Go 1.22 code.
    This change only makes it refuse to build code that says it needs
    Go 1.22 semantics, because Go 1.20 does not provide those.
    
    For #60078.
    
    Change-Id: I75118d6fbd0cc08a6bc309aca54c389a255ba7dc
    Reviewed-on: https://go-review.googlesource.com/c/go/+/518675
    Reviewed-by: Bryan Mills <bcmills@google.com>
    Run-TryBot: Russ Cox <rsc@golang.org>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    rsc committed Aug 11, 2023
    Configuration menu
    Copy the full SHA
    201f8b4 View commit details
    Browse the repository at this point in the history

Commits on Aug 14, 2023

  1. [release-branch.go1.20] net/http: permit requests with invalid Host h…

    …eaders
    
    Historically, the Transport has silently truncated invalid
    Host headers at the first '/' or ' ' character. CL 506996 changed
    this behavior to reject invalid Host headers entirely.
    Unfortunately, Docker appears to rely on the previous behavior.
    
    When sending a HTTP/1 request with an invalid Host, send an empty
    Host header. This is safer than truncation: If you care about the
    Host, then you should get the one you set; if you don't care,
    then an empty Host should be fine.
    
    Continue to fully validate Host headers sent to a proxy,
    since proxies generally can't productively forward requests
    without a Host.
    
    For #60374
    Fixes #61431
    Fixes #61826
    
    Change-Id: If170c7dd860aa20eb58fe32990fc93af832742b6
    Reviewed-on: https://go-review.googlesource.com/c/go/+/511155
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Run-TryBot: Damien Neil <dneil@google.com>
    (cherry picked from commit b9153f6)
    Reviewed-on: https://go-review.googlesource.com/c/go/+/518756
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Russ Cox <rsc@golang.org>
    Run-TryBot: Roland Shoemaker <roland@golang.org>
    neild authored and gopherbot committed Aug 14, 2023
    Configuration menu
    Copy the full SHA
    ede3e27 View commit details
    Browse the repository at this point in the history
  2. [release-branch.go1.20] cmd/go: do not index std as a module in modcache

    We do not index std as a whole module ever.
    
    When working in the main Go repo, files in package change often,
    so we don't want to pay the cost of reindexing all of std when what
    we really need is just to reindex strings. Per-package indexing
    works better for that case.
    
    When using a released Go toolchain, we don't have to worry about
    the whole module changing, but if we switch to whole-module indexing
    at that point, we have the potential for bugs that only happen in
    released toolchains. Probably not worth the risk.
    
    For similar reasons, we don't index the current work module as
    a whole module (individual packages are changing), so we use the heuristic
    that we only do whole-module indexing in the module cache.
    
    The new toolchain modules live in the module cache, though, and
    our heuristic was causing whole-module indexing for them.
    As predicted, enabling whole-module indexing for std when it's
    completely untested does in fact lead to bugs (a very minor one).
    
    This CL turns off whole-module indexing for std even when it is
    in the module cache, to bring toolchain module behavior back in
    line with the other ways to run toolchains.
    
    Updates #57001.
    For #61873.
    
    Change-Id: I5012dc713f566846eb4b2848facc7f75bc956eb9
    Reviewed-on: https://go-review.googlesource.com/c/go/+/504119
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-by: Bryan Mills <bcmills@google.com>
    Auto-Submit: Russ Cox <rsc@golang.org>
    Run-TryBot: Russ Cox <rsc@golang.org>
    (cherry picked from commit a7b1793)
    Reviewed-on: https://go-review.googlesource.com/c/go/+/518415
    Reviewed-by: Russ Cox <rsc@golang.org>
    Run-TryBot: Bryan Mills <bcmills@google.com>
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    rsc authored and gopherbot committed Aug 14, 2023
    Configuration menu
    Copy the full SHA
    1a91bb9 View commit details
    Browse the repository at this point in the history

Commits on Aug 16, 2023

  1. [release-branch.go1.20] crypto/tls: add GODEBUG to control max RSA ke…

    …y size
    
    Add a new GODEBUG setting, tlsmaxrsasize, which allows controlling the
    maximum RSA key size we will accept during TLS handshakes.
    
    Fixes #61966
    
    Change-Id: I52f060be132014d219f4cd438f59990011a35c96
    Reviewed-on: https://go-review.googlesource.com/c/go/+/517495
    Auto-Submit: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Russ Cox <rsc@golang.org>
    Run-TryBot: Roland Shoemaker <roland@golang.org>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-on: https://go-review.googlesource.com/c/go/+/518555
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    rolandshoemaker authored and gopherbot committed Aug 16, 2023
    Configuration menu
    Copy the full SHA
    095cfba View commit details
    Browse the repository at this point in the history

Commits on Aug 17, 2023

  1. [release-branch.go1.20] cmd/api: rename api.go to main_test.go

    This makes cmd/api no longer an importable package.
    In CL 453258 I forgot that there was no direct prohibition
    on importing packages from cmd - we just rely on the
    fact that cmd/* is all package main and everything else
    is cmd/internal.
    
    Fixes #62069.
    Fixes #62070.
    
    Change-Id: Ifed738d333b40663f85eca8f83025fcea5df89a9
    Reviewed-on: https://go-review.googlesource.com/c/go/+/520038
    Reviewed-by: Bryan Mills <bcmills@google.com>
    Run-TryBot: Russ Cox <rsc@golang.org>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-on: https://go-review.googlesource.com/c/go/+/520060
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    rsc authored and gopherbot committed Aug 17, 2023
    Configuration menu
    Copy the full SHA
    14e3c73 View commit details
    Browse the repository at this point in the history
  2. [release-branch.go1.20] go/types, types2: don't panic during interfac…

    …e completion
    
    It should be possible for the importer to construct an invalid
    interface, as would have been produced by type checking.
    
    Updates #61737
    Fixes #61744
    
    Change-Id: I72e063f4f1a6205d273a623acce2ec08c34c3cc2
    Reviewed-on: https://go-review.googlesource.com/c/go/+/515555
    Reviewed-by: Robert Griesemer <gri@google.com>
    Auto-Submit: Robert Findley <rfindley@google.com>
    Reviewed-by: Olif Oftimis <oftimisolif@gmail.com>
    Run-TryBot: Robert Findley <rfindley@google.com>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    (cherry picked from commit d2ee782)
    Reviewed-on: https://go-review.googlesource.com/c/go/+/515638
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@golang.org>
    findleyr authored and gopherbot committed Aug 17, 2023
    Configuration menu
    Copy the full SHA
    974a3c9 View commit details
    Browse the repository at this point in the history
  3. [release-branch.go1.20] runtime: profiling on Darwin cannot use block…

    …ing reads
    
    On Darwin (and assume also on iOS but not sure), notetsleepg
    cannot be called in a signal-handling context.  Avoid this
    by disabling block reads on Darwin.
    
    An alternate approach was to add "sigNote" with a pipe-based
    implementation on Darwin, but that ultimately would have required
    at least one more linkname between runtime and syscall to avoid
    racing with fork and opening the pipe, so, not.
    
    Fixes #62018.
    Updates #61768.
    
    Change-Id: I0e8dd4abf9a606a3ff73fc37c3bd75f55924e07e
    Reviewed-on: https://go-review.googlesource.com/c/go/+/518836
    Run-TryBot: David Chase <drchase@google.com>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    (cherry picked from commit c6ee8e3)
    Reviewed-on: https://go-review.googlesource.com/c/go/+/518677
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Austin Clements <austin@google.com>
    dr2chase authored and gopherbot committed Aug 17, 2023
    Configuration menu
    Copy the full SHA
    b463668 View commit details
    Browse the repository at this point in the history

Commits on Aug 23, 2023

  1. [release-branch.go1.20] path/filepath: don't drop .. elements when cl…

    …eaning invalid Windows paths
    
    Fix a bug where Clean could improperly drop .. elements from a
    path on Windows, when the path contains elements containing a ':'.
    
    For example, Clean("a/../b:/../../c") now correctly returns "..\c"
    rather than "c".
    
    For #61866.
    Fixes #61867.
    
    Change-Id: I97b0238953c183b2ce19ca89c14f26700008ea72
    Reviewed-on: https://go-review.googlesource.com/c/go/+/517216
    Run-TryBot: Damien Neil <dneil@google.com>
    Reviewed-by: Bryan Mills <bcmills@google.com>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-by: Quim Muntal <quimmuntal@gmail.com>
    (cherry picked from commit 6e43407)
    Reviewed-on: https://go-review.googlesource.com/c/go/+/519636
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Run-TryBot: Dmitri Shuralyov <dmitshur@golang.org>
    Reviewed-by: Damien Neil <dneil@google.com>
    neild authored and cagedmantis committed Aug 23, 2023
    Configuration menu
    Copy the full SHA
    f0b8768 View commit details
    Browse the repository at this point in the history

Commits on Aug 24, 2023

  1. [release-branch.go1.20] cmd/compile: in expandCalls, move all arg mar…

    …shalling into call block
    
    For aggregate-typed arguments passed to a call, expandCalls
    decomposed them into parts in the same block where the value
    was created.  This is not necessarily the call block, and in
    the case where stores are involved, can change the memory
    leaving that block, and getting that right is problematic.
    
    Instead, do all the expanding in the same block as the call,
    which avoids the problems of (1) not being able to reorder
    loads/stores across a block boundary to conform to memory
    order and (2) (incorrectly, not) exposing the new memory to
    consumers in other blocks.  Putting it all in the same block
    as the call allows reordering, and the call creates its own
    new memory (which is already dealt with correctly).
    
    Fixes #62056.
    Updates #61992.
    
    Change-Id: Icc7918f0d2dd3c480cc7f496cdcd78edeca7f297
    Reviewed-on: https://go-review.googlesource.com/c/go/+/519276
    Reviewed-by: Keith Randall <khr@google.com>
    Run-TryBot: David Chase <drchase@google.com>
    Reviewed-by: Keith Randall <khr@golang.org>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    (cherry picked from commit e72ecc6)
    Reviewed-on: https://go-review.googlesource.com/c/go/+/520059
    dr2chase authored and cagedmantis committed Aug 24, 2023
    Configuration menu
    Copy the full SHA
    612da32 View commit details
    Browse the repository at this point in the history

Commits on Sep 6, 2023

  1. [release-branch.go1.20] html/template: support HTML-like comments in …

    …script contexts
    
    Per Appendix B.1.1 of the ECMAScript specification, support HTML-like
    comments in script contexts. Also per section 12.5, support hashbang
    comments. This brings our parsing in-line with how browsers treat these
    comment types.
    
    Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for
    reporting this issue.
    
    Fixes #62196
    Fixes #62395
    Fixes CVE-2023-39318
    
    Change-Id: Id512702c5de3ae46cf648e268cb10e1eb392a181
    Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1976593
    Run-TryBot: Roland Shoemaker <bracewell@google.com>
    Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
    Reviewed-by: Damien Neil <dneil@google.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2014620
    Reviewed-on: https://go-review.googlesource.com/c/go/+/526098
    Run-TryBot: Cherry Mui <cherryyz@google.com>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    rolandshoemaker authored and cherrymui committed Sep 6, 2023
    Configuration menu
    Copy the full SHA
    023b542 View commit details
    Browse the repository at this point in the history
  2. [release-branch.go1.20] html/template: properly handle special tags w…

    …ithin the script context
    
    The HTML specification has incredibly complex rules for how to handle
    "<!--", "<script", and "</script" when they appear within literals in
    the script context. Rather than attempting to apply these restrictions
    (which require a significantly more complex state machine) we apply
    the workaround suggested in section 4.12.1.3 of the HTML specification [1].
    
    More precisely, when "<!--", "<script", and "</script" appear within
    literals (strings and regular expressions, ignoring comments since we
    already elide their content) we replace the "<" with "\x3C". This avoids
    the unintuitive behavior that using these tags within literals can cause,
    by simply preventing the rendered content from triggering it. This may
    break some correct usages of these tags, but on balance is more likely
    to prevent XSS attacks where users are unknowingly either closing or not
    closing the script blocks where they think they are.
    
    Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for
    reporting this issue.
    
    Fixes #62197
    Fixes #62397
    Fixes CVE-2023-39319
    
    [1] https://html.spec.whatwg.org/#restrictions-for-contents-of-script-elements
    
    Change-Id: Iab57b0532694827e3eddf57a7497ba1fab1746dc
    Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1976594
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
    Reviewed-by: Damien Neil <dneil@google.com>
    Run-TryBot: Roland Shoemaker <bracewell@google.com>
    Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2014621
    TryBot-Result: Security TryBots <security-trybots@go-security-trybots.iam.gserviceaccount.com>
    Reviewed-on: https://go-review.googlesource.com/c/go/+/526099
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Run-TryBot: Cherry Mui <cherryyz@google.com>
    rolandshoemaker authored and cherrymui committed Sep 6, 2023
    Configuration menu
    Copy the full SHA
    2070531 View commit details
    Browse the repository at this point in the history
  3. [release-branch.go1.20] go1.20.8

    Change-Id: Iac628daa970d01c5958839fcf668106e93bce8b0
    Reviewed-on: https://go-review.googlesource.com/c/go/+/526037
    Reviewed-by: Joedian Reid <joedian@golang.org>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Auto-Submit: Gopher Robot <gobot@golang.org>
    Run-TryBot: Cherry Mui <cherryyz@google.com>
    Reviewed-by: Cherry Mui <cherryyz@google.com>
    gopherbot authored and cherrymui committed Sep 6, 2023
    Configuration menu
    Copy the full SHA
    d5b8518 View commit details
    Browse the repository at this point in the history
Loading
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy