-
Notifications
You must be signed in to change notification settings - Fork 18.7k
Bump Golang to 1.9.4 #36243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump Golang to 1.9.4 #36243
Conversation
This fixes a vulnerability in `go get` (CVE-2018-6574, http://golang.org/issue/23672), but shouldn't really affect our code, but it's good to keep in sync. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
ping @jhowardmsft @johnstep looks like the fix in Golang actually broke our Windows build (see the patch: golang/go@867fb18)
|
Looks like this was added in fa82c0a (#22840) to work around an issue on Nano Server TP5 (see golang/go#15286) I see that fix was removed in Docker CLI (docker/cli#8), and looks like it's no longer needed, so I'll remove that code |
This workaround for golang/go#15286 was added for Nano server TP5 in fa82c0a, and should no longer be needed Due to a security fix in Go 1.9.4/1.8.7, loading the .dll is no longer allowed, and produces an error: .\docker_windows.go:9:3: //go:cgo_import_dynamic main.dummy CommandLineToArgvW%2 "shell32.dll" only allowed in cgo-generated code Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
_ "github.com/docker/docker/autogen/winresources/dockerd" | ||
) | ||
|
||
//go:cgo_import_dynamic main.dummy CommandLineToArgvW%2 "shell32.dll" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I assume this is no longer needed @jstarks ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM if green 🐸
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
This fixes a vulnerability in
go get
(CVE-2018-6574, http://golang.org/issue/23672),but shouldn't really affect our code, but it's good to keep in sync.