-
Notifications
You must be signed in to change notification settings - Fork 17.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crypto/x509: link Security.framework symbols without cgo #32604
Comments
And drop the cgo one too. There's not much of a strong reason for keeping cgo around when you can efficiently implement the same exact code in Go. |
Change https://golang.org/cl/227037 mentions this issue: |
Wow that was quick @FiloSottile. Is there an easy way to test it out locally? I’d like to be helpful. |
Not yet, it's just a stub making the linker parts work, I haven't ported the logic to Go yet. I'll ping this issue when it's ready to test, and I'll definitely appreciate testing in as many settings as possible. |
Hey @FiloSottile, happy to help here too. We're seeing CGO-disabled CLI binaries are failing with cert verify errors, which I think could be fixed by this change. |
Could you test the CL on those machines?
You can also use |
Thank you for the quick reply! I'll need to poke the affected users and have them run it. (My machine doesn't have a problem with CGO/no-CGO.) |
Here's their results:
And my machine's results, for comparison:
|
Follow up: the new binaries I built also work great for them. Seems like this is the fix we need! 🚀 |
Hey @FiloSottile, thanks again for your great work here. Is there anything I can do now to help nudge this one along? |
Glad to see it merged! Thanks again, @FiloSottile 🎉 🚀 |
Great @FiloSottile ! Thank you. |
What go version(s) is this rolling into? |
Into Go1.15. There will be releases for Go1.15 in between, before Go1.15 is
finally released perhaps after August 2020.
…On Mon, May 11, 2020 at 9:25 PM Avi Deitcher ***@***.***> wrote:
What go version(s) is this rolling into?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#32604 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABFL3V4ZCL4PJJVOQL2TDY3RRDFUNANCNFSM4HX33PTQ>
.
|
Oof. That’s a while off. Are there any compatibility concerns with cherry-picking into the next patch of 1.14? |
We only cherry-pick critical and safe fixes, and this is definitely too large and risky for a minor release, sorry. |
No worries, I understand 👍 Thanks again! |
Just like we link libSystem when
CGO_ENABLED=0
, we can probably do the same with Security.framework for obtaining the root CAs, and drop the horrible no-cgo fallback path that shells out tosecurity
. The latter is slow and makes some dangerous approximations due to not having access to the actual trust policies.Suggested by @zx2c4.
The text was updated successfully, but these errors were encountered: