<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.13.14</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.13.14</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.13.14'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2020-07-16T22:23:43Z</updated>
<entry>
<title>[release-branch.go1.13] go1.13.14</title>
<updated>2020-07-16T22:23:43Z</updated>
<author>
<name>Andrew Bonventre</name>
<email>andybons@golang.org</email>
</author>
<published>2020-07-16T21:41:24Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=d3ba94164a1c404a01369fb54ddd4f5b94d91348'/>
<id>urn:sha1:d3ba94164a1c404a01369fb54ddd4f5b94d91348</id>
<content type='text'>
Change-Id: Id54fd93e1839c28e40e9fcdaa5e7304dae274565
Reviewed-on: https://go-review.googlesource.com/c/go/+/243139
Run-TryBot: Andrew Bonventre &lt;andybons@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13] database/sql: backport 5 Tx rollback related CLs</title>
<updated>2020-07-16T00:34:33Z</updated>
<author>
<name>Emmanuel T Odeke</name>
<email>emmanuel@orijtech.com</email>
</author>
<published>2020-07-15T01:20:47Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=42e7927c5fe2da4d00786a9025bc7f8f994b0fa4'/>
<id>urn:sha1:42e7927c5fe2da4d00786a9025bc7f8f994b0fa4</id>
<content type='text'>
Manually backported the subject CLs, because of lack of
Gerrit "forge-author" permissions, but also because the prior
cherry picks didn't apply cleanly, due to a tight relation chain.

The backport comprises of:
* CL 174122
* CL 216197
* CL 223963
* CL 216240
* CL 216241

Note:
Due to the restrictions that we cannot retroactively
introduce API changes to Go1.13.13 that weren't in Go1.13, the Conn.Validator
interface (from CL 174122, CL 223963) isn't exposed, and drivers will just be
inspected, for if they have an IsValid() bool method implemented.

For a description of the content of each CL:

* CL 174122:
database/sql: process all Session Resets synchronously

Adds a new interface, driver.ConnectionValidator, to allow
drivers to signal they should not be used again,
separatly from the session resetter interface.
This is done now that the session reset is done
after the connection is put into the connection pool.

Previous behavior attempted to run Session Resets
in a background worker. This implementation had two
problems: untested performance gains for additional
complexity, and failures when the pool size
exceeded the connection reset channel buffer size.

* CL 216197:
database/sql: check conn expiry when returning to pool, not when handing it out

With the original connection reuse strategy, it was possible that
when a new connection was requested, the pool would wait for an
an existing connection to return for re-use in a full connection
pool, and then it would check if the returned connection was expired.
If the returned connection expired while awaiting re-use, it would
return an error to the location requestiong the new connection.
The existing call sites requesting a new connection was often the last
attempt at returning a connection for a query. This would then
result in a failed query.

This change ensures that we perform the expiry check right
before a connection is inserted back in to the connection pool
for while requesting a new connection. If requesting a new connection
it will no longer fail due to the connection expiring.

* CL 216240:
database/sql: prevent Tx statement from committing after rollback

It was possible for a Tx that was aborted for rollback
asynchronously to execute a query after the rollback had completed
on the database, which often would auto commit the query outside
of the transaction.

By W-locking the tx.closemu prior to issuing the rollback
connection it ensures any Tx query either fails or finishes
on the Tx, and never after the Tx has rolled back.

* CL 216241:
database/sql: on Tx rollback, retain connection if driver can reset session

Previously the Tx would drop the connection after rolling back from
a context cancel. Now if the driver can reset the session,
keep the connection.

* CL 223963
database/sql: add test for Conn.Validator interface

This addresses comments made by Russ after
https://golang.org/cl/174122 was merged. It addes a test
for the connection validator and renames the interface to just
"Validator".

Updates #31480
Updates #32530
Updates #32942
Updates #34775
Fixes #40205

Change-Id: I6d7307180b0db0bf159130d91161764cf0f18b58
Reviewed-on: https://go-review.googlesource.com/c/go/+/242522
Run-TryBot: Emmanuel Odeke &lt;emm.odeke@gmail.com&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Daniel Theophanes &lt;kardianos@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13] all: merge release-branch.go1.13-security into release-branch.go1.13</title>
<updated>2020-07-14T18:39:38Z</updated>
<author>
<name>Katie Hockman</name>
<email>katie@golang.org</email>
</author>
<published>2020-07-14T18:39:38Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=6e1b89a431337a1e4584bd15f3a1af9c5c7b1bb0'/>
<id>urn:sha1:6e1b89a431337a1e4584bd15f3a1af9c5c7b1bb0</id>
<content type='text'>
Change-Id: Id0cca0e1006d92960e7f665d41111483c0fcea13
</content>
</entry>
<entry>
<title>[release-branch.go1.13-security] go1.13.13</title>
<updated>2020-07-14T14:10:10Z</updated>
<author>
<name>Andrew Bonventre</name>
<email>andybons@golang.org</email>
</author>
<published>2020-07-14T13:15:35Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=1f8859c22ccdeb969b252c8139bf4b1aae5c4909'/>
<id>urn:sha1:1f8859c22ccdeb969b252c8139bf4b1aae5c4909</id>
<content type='text'>
Change-Id: I65f5d9cc1363d369ced4496c1d6d3d7f9144f1b8
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/794127
Reviewed-by: Katie Hockman &lt;katiehockman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13-security] crypto/x509: respect VerifyOptions.KeyUsages on Windows</title>
<updated>2020-07-14T12:23:08Z</updated>
<author>
<name>Filippo Valsorda</name>
<email>filippo@golang.org</email>
</author>
<published>2020-06-19T02:45:52Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=4a4c8d3d971fa77e4346d2874220ff736047f13c'/>
<id>urn:sha1:4a4c8d3d971fa77e4346d2874220ff736047f13c</id>
<content type='text'>
When using the platform verifier on Windows (because Roots is nil) we
were always enforcing server auth EKUs if DNSName was set, and none
otherwise. If an application was setting KeyUsages, they were not being
respected.

Started correctly surfacing IncompatibleUsage errors from the system
verifier, as those are the ones applications will see if they are
affected by this change.

Also refactored verify_test.go to make it easier to add tests for this,
and replaced the EKULeaf chain with a new one that doesn't have a SHA-1
signature.

Thanks to Niall Newman for reporting this.

Fixes #39360
Fixes CVE-2020-14039

Change-Id: If5c00d615f2944f7d57007891aae1307f9571c32
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/774414
Reviewed-by: Katie Hockman &lt;katiehockman@google.com&gt;
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/793509
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13-security] net/http: synchronize "100 Continue" write and Handler writes</title>
<updated>2020-07-13T20:57:52Z</updated>
<author>
<name>Russ Cox</name>
<email>rsc@golang.org</email>
</author>
<published>2020-07-13T17:27:22Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=e434185ec16b3783629bcb364b9a350706df7c1e'/>
<id>urn:sha1:e434185ec16b3783629bcb364b9a350706df7c1e</id>
<content type='text'>
The expectContinueReader writes to the connection on the first
Request.Body read. Since a Handler might be doing a read in parallel or
before a write, expectContinueReader needs to synchronize with the
ResponseWriter, and abort if a response already went out.

The tests will land in a separate CL.

Fixes #34902
Fixes CVE-2020-15586

Change-Id: Icdd8dd539f45e8863762bd378194bb4741e875fc
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/793350
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
(cherry picked from commit b5e504f4a07c572744b228fa1b10e3989c4c44f3)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/793499
</content>
</entry>
<entry>
<title>[release-branch.go1.13] net/http: fix panic with If-None-Match value in http.ServeContent</title>
<updated>2020-07-13T18:33:23Z</updated>
<author>
<name>Marcus Weiner</name>
<email>marcus.weiner@gmail.com</email>
</author>
<published>2020-06-24T15:24:56Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=e19af0f1447e0f99688949c68cd8c39d188f699c'/>
<id>urn:sha1:e19af0f1447e0f99688949c68cd8c39d188f699c</id>
<content type='text'>
Updates #39817.
Fixes #39925.

Change-Id: I79f2ad7c836a8a46569f603aca583fdd526d22dc
GitHub-Last-Rev: 5b88aada219aaa2af0c7e1969ed6fa646117d9da
GitHub-Pull-Request: golang/go#39821
Reviewed-on: https://go-review.googlesource.com/c/go/+/239699
Run-TryBot: Brad Fitzpatrick &lt;bradfitz@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Brad Fitzpatrick &lt;bradfitz@golang.org&gt;
(cherry picked from commit ce81a8f5e4f6c33036aa0777fabc47eeeab468dc)
Reviewed-on: https://go-review.googlesource.com/c/go/+/242077
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Marcus Weiner &lt;marcus.weiner@gmail.com&gt;
Reviewed-by: Emmanuel Odeke &lt;emm.odeke@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13] reflect: zero stack slots before writing to them with write barriers</title>
<updated>2020-07-11T02:49:54Z</updated>
<author>
<name>Keith Randall</name>
<email>khr@golang.org</email>
</author>
<published>2020-06-18T19:51:35Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=3c1722cf30d1edc6756022c7a12efffabcfb098a'/>
<id>urn:sha1:3c1722cf30d1edc6756022c7a12efffabcfb098a</id>
<content type='text'>
reflect.assignTo writes to the target using write barriers. Make sure
that the memory it is writing to is zeroed, so the write barrier does
not read pointers from uninitialized memory.

Fixes #39697

Change-Id: Ia64b2cacc193bffd0c1396bbce1dfb8182d4905b
Reviewed-on: https://go-review.googlesource.com/c/go/+/238760
Run-TryBot: Keith Randall &lt;khr@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Ian Lance Taylor &lt;iant@golang.org&gt;
(cherry picked from commit 3dec253783e1211989102ac6abd34cddbf8ba0e6)
Reviewed-on: https://go-review.googlesource.com/c/go/+/238862
Reviewed-by: Emmanuel Odeke &lt;emm.odeke@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13] cmd/compile: remove check that Zero's arg has the correct base type</title>
<updated>2020-07-10T22:19:31Z</updated>
<author>
<name>Keith Randall</name>
<email>khr@golang.org</email>
</author>
<published>2020-06-25T03:59:18Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=0b75fc7a92b8973601040eed8d13d8775d099f43'/>
<id>urn:sha1:0b75fc7a92b8973601040eed8d13d8775d099f43</id>
<content type='text'>
It doesn't have to. The type in the aux field is authoritative.
There are cases involving casting from interface{} where pointers
have a placeholder pointer type (because the type is not known when
the IData op is generated).

The check was introduced in CL 13447.

Fixes #39848

Change-Id: Id77a57577806a271aeebd20bea5d92d08ee7aa6b
Reviewed-on: https://go-review.googlesource.com/c/go/+/239817
Run-TryBot: Keith Randall &lt;khr@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
(cherry picked from commit 3b2f67a59702e4881625cb967f853ef56b0c4828)
Reviewed-on: https://go-review.googlesource.com/c/go/+/239998
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.13] cmd/go: convert TestBuildIDContainsArchModeEnv to the script framework</title>
<updated>2020-06-29T20:51:55Z</updated>
<author>
<name>Michael Matloob</name>
<email>matloob@golang.org</email>
</author>
<published>2020-01-10T22:53:05Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=82c1a8705bc586d1d417a4b58b6e07aa01e93ba9'/>
<id>urn:sha1:82c1a8705bc586d1d417a4b58b6e07aa01e93ba9</id>
<content type='text'>
Part of converting all tests to script framework to improve
test parallelism.

Fixes #39823
Updates #36320
Updates #17751

Change-Id: I69c69809fb1698c8198ef3ea00103a9acb7b6ce7
Reviewed-on: https://go-review.googlesource.com/c/go/+/214387
Run-TryBot: Michael Matloob &lt;matloob@golang.org&gt;
Reviewed-by: Jay Conrod &lt;jayconrod@google.com&gt;
(cherry picked from CL 214387)
Reviewed-on: https://go-review.googlesource.com/c/go/+/239777
Run-TryBot: Bryan C. Mills &lt;bcmills@google.com&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Michael Matloob &lt;matloob@golang.org&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
</feed>
