75 Commits

Author SHA1 Message Date
jsing
4db8f7e433 Update lang/go to 1.13.3.
This includes security fixes released in 1.13.2.
2019-10-24 16:22:07 +00:00
sthen
f23085c90b fix MODGO_PACKAGES and MODGO_TOOLS arch name on aarch64 machines (using
the same arch conversion list as done in the lang/go port itself; add
a comment reminding to keep them in-sync). unbreaks packaging of the
few golang ports that actually build on aarch64.
2019-10-06 15:37:15 +00:00
jsing
0d05e35621 Update lang/go to 1.13.1.
This addresses a security issue in net/http.

ok naddy@
2019-10-04 17:02:11 +00:00
tb
435f824b93 Make tests work with PORTS_PRIVSEP=Yes. 2019-09-27 19:04:57 +00:00
jsing
c15e53f079 Enable Go on aarch64/arm64.
ok phessler@
2019-09-15 02:00:34 +00:00
jsing
96037ecdb2 Update the lang/go binary bootstrap to Go 1.13. 2019-09-13 09:04:07 +00:00
jsing
1f984f36de Update lang/go to Go 1.13.
ok abieber@ sthen@
2019-09-12 18:48:30 +00:00
jsing
800793e1df Update lang/go to 1.12.8.
This includes security fixes to the net/http and net/url packages.
2019-08-14 08:23:28 +00:00
sthen
3318ced016 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:46:54 +00:00
jsing
3395d04c86 Update lang/go to Go 1.12.7. 2019-07-09 17:54:46 +00:00
jsing
d3f9579cdb Update lang/go to 1.12.5 2019-05-07 16:33:42 +00:00
jsing
57d0434c51 Ensure GOCACHE refers to a suitable location when building Go.
Issue found and fix verified by phessler@
2019-05-04 15:03:15 +00:00
jsing
1948bd9861 Build lang/go for openbsd/arm using a binary bootstrap.
With input from and ok sthen@.
2019-04-19 07:15:36 +00:00
jsing
f3753ee987 Update lang/go to 1.12.4. 2019-04-15 17:14:14 +00:00
jsing
5878478513 Update lang/go to version 1.12.1. 2019-03-16 15:01:30 +00:00
jsing
9b0fce0dd3 Update lang/go to version 1.12.
ok sthen@
2019-03-16 13:37:29 +00:00
jsing
a3bbf060d3 Use hw.ncpuonline rather than hw.ncpu to determine how many threads to run.
Prompted by tedu@
2019-02-09 15:09:19 +00:00
jsing
cafca2f498 Update lang/go to 1.11.5.
This includes a security fix to the crypto/elliptic package.
2019-01-29 14:25:28 +00:00
jsing
a20b34842d Allow weak symbols to be duplicated when already defined.
When -mretpoline is enabled with clang, a __llvm_retpoline_r11 weak symbol
is emitted in each compilation unit. This results in the Go linker
complaining when processing a package archive that contains cgo linkages,
since it finds the same weak symbol defined in multiple object files.

Relax the duplicate symbol detection such that weak symbols are permitted
to be duplicated. This makes it possible to build Go with clang again and
addresses a similar duplicate weak symbol issue that results from retguard.

Also backport an upstream commit that corrects the handling of libgcc vs
libcompiler_rt. Combined with the above fix `make regress` now passes with
both gcc and clang.
2019-01-05 12:59:25 +00:00
jsing
964270cb22 Update lang/go to version 1.11.4.
This minor revision update includes various fixes, three of which address
security related issues.
2018-12-15 14:54:41 +00:00
jsing
4d07fd460a Update lang/go to 1.11.2. 2018-11-04 20:49:46 +00:00
jsing
126d7b3255 Update lang/go to 1.11. 2018-09-23 17:19:10 +00:00
kn
0578fb6c1e Simplify do-install, combine/improve find calls, clean up whitespace nits.
No package change.

OK jsing, jca
2018-05-10 18:39:35 +00:00
kn
d6091e4b61 Update to go 1.10.1
OK jsing
2018-04-06 13:01:39 +00:00
jsing
8ae8d8fb90 Update PLIST for lang/go MAP_STACK change.
The MAP_STACK patches create a new source file, however the PLIST was not
updated to include it.

Found the hard way by abieber@ and nigel@
2018-04-06 05:56:44 +00:00
jsing
b81b4b0398 Make go work with MAP_STACK. 2018-04-05 18:38:38 +00:00
jsing
cc12b02993 Update lang/go to Go 1.10.
ok jasper@
2018-03-14 14:14:36 +00:00
jsing
02bb071ec1 Update lang/go to 1.9.2
From Klemens Nanni <kl3 at posteo dot org> - thanks.
2017-11-28 16:27:21 +00:00
jsing
6d1493a288 Update lang/go to version 1.9.1. 2017-10-07 14:28:45 +00:00
jsing
24fbcf9e7e Update lang/go to version 1.9.
ok ajacoutot@ jasper@
2017-09-03 15:42:25 +00:00
jsing
1a0c0a8666 Fix compiler flag handling and --print-libgcc-file-name hack, now that
clang is installed as cc. Allows regress pass again.
2017-08-31 17:05:19 +00:00
jsing
41a72622d3 Make lang/go work with clang.
This requires three changes:

- OpenBSD clang produces __guard_local symbols that are marked as hidden,
  which causes problems with the go linker. Workaround this by explicitly
  making __guard_local symbols visible when reading in an ELF object.

- OpenBSD clang currently fails to correctly report the compiler runtime
  via --print-libgcc-file-name. Workaround this issue by hardcoding it
  for the time being.

- The TestCgoConsistentResults test passes successfully outside of ports,
  however fails under a ports build. This requires further investigation
  but we can just skip the test for now.
2017-06-04 18:04:03 +00:00
pea
a883867877 Update to 1.8.3
ok jsing@
2017-05-27 11:18:27 +00:00
pea
165b667c2d Security update to 1.8.2 (CVE-2017-8932)
ok jsing@
2017-05-24 20:18:14 +00:00
jsing
70dca0b655 Update lang/go to 1.8.1. 2017-04-10 16:50:19 +00:00
jsing
3b234e6ab1 Update lang/go to version 1.8.
ok ajacoutot@
2017-02-23 15:57:42 +00:00
jsing
cd64551231 Update lang/go to 1.7.4.
This release addresses a security issue with net/http package's
Request.ParseMultipartForm method:

  https://golang.org/doc/devel/release.html#go1.7.minor

ok jasper@
2016-12-06 15:40:09 +00:00
czarkoff
ede8b86eb5 make go libraries build- and run-depend on particular version of lang/go
Go libraries should be rebuilt on every lang/go update.  This change adds
runtime dependency on lang/go for ports with "lib" in MODGO_TYPE, and tunes
PKGSPEC to force dependency on exact version of go.

OK jsing@, "makes sense" sthen@
2016-08-21 14:08:25 +00:00
jsing
6c8e51f58a Upgrade lang/go to 1.7.
ok czarkoff@ pea@
2016-08-18 17:23:03 +00:00
pea
c2816f26a8 Security update to 1.6.3 (CVE-2016-5386)
ok jsing@, naddy@
2016-07-20 15:52:14 +00:00
jsing
cd24745d47 Update lang/go to handle the sys_thrkill/sys_kill change.
Partially based on a diff from Ray Lai.
2016-06-27 15:57:17 +00:00
jsing
64a2bf49e4 Update lang/go to 1.6.2. 2016-05-20 16:03:24 +00:00
jsing
2f91d6db57 Allow lang/go to generate PT_TLS when cgo is used on OpenBSD. This makes
Go 1.6 pass regress on openbsd/386 and openbsd/amd64. Also stop exporting
environ and __progname from cgo, since these symbols are no longer required
by libc.
2016-05-16 13:50:01 +00:00
jsing
4d26e08575 Stop using sigreturn from the Go openbsd/386 signal trampoline - the
sigreturn syscall is going away in future versions of OpenBSD and its
use for Go is already broken due to the trampoline return checks. Instead
just return directly from the signal trampoline (as we have always done
for Go openbsd/amd64).

Also fix a bug in the Go openbsd/386 linker, which results in symbols in
the dynamic symbol table being emitted with a size of zero. With a current
ld.so, this results in symbol mismatch warnings.

Unbreaks the Go port on openbsd/386, however it still fails to pass regress
due to the PT_TLS changes.
2016-05-13 13:49:26 +00:00
czarkoff
fd3cfcf84f update to go 1.6
OK jsing (MAINTAINER)
2016-05-11 15:19:04 +00:00
czarkoff
f7c3c0505e Set INSTALL_STRIP= for go ports
OK ajacoutot@, sthen@
2016-05-05 10:46:50 +00:00
juanfra
c1e0f9a3a3 Update to go 1.5.4. OK jasper@ jsing@ (MAINTAINER).
https://groups.google.com/forum/#!topic/golang-announce/9eqIHqaWvck

"Go's crypto libraries passed certain parameters unchecked to the
underlying big integer library, possibly leading to extremely
long-running computations, which in turn makes Go programs vulnerable to
remote denial of service attacks.  Programs using HTTPS client
certificates or the Go SSH server libraries are both exposed to this
vulnerability.
This is CVE-2016-3959 and was addressed by this change:
https://golang.org/cl/21533
Thanks to David Wong for identifying this issue."
2016-04-14 17:43:26 +00:00
jsing
1c5714d152 Update lang/go to 1.5.3.
This release addresses CVE-2015-8618.

ok ajacoutot@ sthen@
2016-01-14 12:11:50 +00:00
jsing
1f47045c93 Update to Go 1.5.2.
This also installs in a manner that allows /usr/local/go to now be used for
GOROOT_BOOTSTRAP, if building from source.

ok jasper@
2015-12-05 05:01:24 +00:00
jasper
b7f5bf9dcf backport various security fixes:
- CVE-2015-5739, "Content Length" treated as valid header
- CVE-2015-5740, Double content-length headers does not return 400 error
- CVE-2015-5741, Additional hardening, not sending Content-Length w/Transfer-Encoding, Closing connections

from upstream git

ok jsing@ (MAINTAINER), czarkoff@
2015-08-19 06:57:20 +00:00