Commit Graph

31706 Commits

Author SHA1 Message Date
John Audia d62471c093 vectorscan: new package for speeding up regex ops
Vectorscan is fork of Hyperscan, a high-performance multiple regex
matching library. It follows the regular expression syntax of the
commonly-used libpcre library, but is a standalone library with
its own C API.

Currently ARM NEON/ASIMD and Power VSX are 100% functional. ARM
SVE2 support is in ongoing with access to hardware now. More
platforms will follow in the future.

The performance difference of snort3 compiled against this is
sizable.

Test SoC #1 flogic/glinet_gl-mt6000
IDS mode:
Download speed wo/ vectorscan: 91.2 ±0.21 Mbit/s (n=3)
Download speed using vectorscan: 331.0 ±27.34 Mbit/s (n=3)
Gain of 3.6x

IPS mode:
Download speed wo/ vectorscan: 30.0 ±0.06 Mbit/s (n=3)
Download speed using vectorscan: 52.9 ±0.78 Mbit/s (n=3)
Gain of 1.8x

Notes:
* Data generated on snapshot build on 12-Apr-2024 using kernel
  6.6.26, snort 3.1.84.0, vectorscan 5.4.11.
* Speedtest script hitting the same server.
* Snort rules file of was 37,917 lines/22 MB.
* In all cases, single core CPU saturation occurred which
  speaks to the efficiency gains supplied by vectorscan.

Test Soc #2 bcm2712/RPi5B

IPS mode:
Download speed wo/ vectorscan: 164.3 ±0.64 Mbit/s (n=3)
Download speed using vectorscan: 232.8 ±0.26 Mbit/s (n=3)
Gain of 1.4x

Notes:
* Data generated on snapshot build on 13-Apr-2024 using kernel
  6.1.86, snort 3.1.84.0, vectorscan 5.4.11.
* Google fiber speedtest (https://fiber.google.com/speedtest/)
  hitting the same server.
* Snort rules contained 39,801 rules/22 MB.
* In all cases, single core CPU saturation occurred which
  speaks to the efficiency gains supplied by vectorscan.

Build system: x86/64
Build-tested: flogic/glinet_gl-mt6000, bcm2712/RPi5B
Run-tested: flogic/glinet_gl-mt6000, bcm2712/RPi5B

Co-authored-by: Tianling Shen <cnsztl@gmail.com>
Co-authored-by: Jeffery To <jeffery.to@gmail.com>
Signed-off-by: John Audia <therealgraysky@proton.me>
2024-04-13 16:03:40 -04:00
krant a9ae9bad06 minicom: update to 2.9
- Refresh the patch

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-12 17:00:02 +08:00
Stijn Tintel eb53418b7f
Merge pull request #23832 from chommik/softflowd_add_b_option
softflowd: add '-b' option to config
2024-04-12 11:36:20 +03:00
krant ecc4ecb9d5 whois: update to 5.5.22
- Don't override PKG_BUILD_DIR since tarball is now properly constructed

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-12 05:45:49 +02:00
krant 1cdbbea0ac libevdev: update to 1.13.1
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-12 00:39:20 +01:00
krant 7e54b2b3fc libdeflate: update to 1.20
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-12 00:38:55 +01:00
Rafal Macyszyn 80b15f0b9e softflowd: add '-b' option to config
- add '-b' option to enable bidirectional flow probing

Signed-off-by: Rafal Macyszyn <rafal@v92.pl>
2024-04-11 21:54:28 +02:00
Christian Marangi 4d9ec853be
devel: gcc: refresh patches
Refresh patches with make package/gcc/refresh by tweaking the
GCC_VERSION to refresh every supported version.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-04-11 13:48:13 +02:00
Christian Marangi da8303d430
devel: gcc: add support for GCC 13
Add support for GCC 13 and take patches from openwrt main repo.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-04-11 13:48:12 +02:00
Christian Marangi a6934ed64e
devel: gcc: add missing RISCV patches for GCC 12
Add missing RISCV patches for GCC 12 from openwrt toolchain GCC.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-04-11 13:48:12 +02:00
Christian Marangi b31d6da0a8
devel: gcc: align patches structure to openwrt toolchain GCC
Align patches structure to openwrt toolchain GCC to make it easier to
maintain them and reduce patch delta on GCC update.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-04-11 13:48:09 +02:00
Yousong Zhou 020d925f66 pppossh: add option peer_pppd_options
This can be useful for things like making the interface on the peer side
fixed with value like `ifname xx`

Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2024-04-11 08:49:13 +08:00
krant 1de03eb259 libdrm: update to 2.4.120
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:15:51 -07:00
krant 74045fac6c pixman: update to 0.43.4
- Use HTTPS for project URL
- Drop obsolete patch

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:15:45 -07:00
krant 0f4591537a qemu: update to 8.2.2
- Use HTTPS for URLs

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:15:28 -07:00
krant c47809b015 imagemagick: update to 7.1.1.30
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:15:18 -07:00
krant 3903d93d96 libpciaccess: update to 0.18.1
- Use Meson build system
- Drop upstreamed patch
- Update project URL

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:14:51 -07:00
krant 6f19eb2f4e pciutils: update to 3.12.0
- Refresh patch

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:14:03 -07:00
krant bf0b0bea6c c-ares: update to 1.28.1
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:13:53 -07:00
krant 8d4b72c53b libarchive: update to 3.7.3
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-10 16:13:35 -07:00
David Andreoletti 1cfb5ca084 mosquitto: support anonymous user per listener
Signed-off-by: David Andreoletti <david@andreoletti.net>
2024-04-10 09:33:42 +00:00
Peter van Dijk 6809010ef9 dnsdist: update to 1.9.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2024-04-09 20:57:02 -07:00
Alexandru Ardelean 83bdecf057
Merge pull request #23838 from krant/openblas
openblas: update to 0.3.27
2024-04-09 08:28:18 +03:00
Alexandru Ardelean 1273c3bf7e
Merge pull request #23837 from krant/numpy
numpy: update to 1.26.4
2024-04-09 08:27:46 +03:00
krant c2362f3407 graphicsmagick: update to 1.3.43
- Set project URL to HTTP since HTTPS one is broken

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-08 13:26:27 -07:00
Josef Schlehofer 0969ce7137
Merge pull request #23824 from JiaY-shi/go
golang: update to 1.22.2
2024-04-08 14:27:55 +02:00
Florian Eckert c9eb80412b
Merge pull request #23723 from findlayfeng/fix_proto-bonding
proto-bonding: Modify ipaddr as optional
2024-04-08 10:43:09 +02:00
Rosen Penev 4e5f5a09c5 acpica-unix: update to 20240321
Remove PKG_CAT. No need for it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2024-04-08 01:31:20 -07:00
Rosen Penev 7be4cc6411 ola: update to 0.10.9
Use local tarballs instead of codeload. Smaller size.

Patch ola.m4 to support statically linked protobuf. Avoids rpath hacks.

Remove upstream backport.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2024-04-08 01:30:31 -07:00
Rosen Penev d24229e441 protobuf: don't use shared libraries for host
Avoids needing to handle rpath.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2024-04-08 01:30:31 -07:00
Robert Marko 9f78055f94 treewide: refresh missed hashes after move to use ZSTD as default
This is a follow-up on the previous treewide refresh of hashes after move
to ZSTD by default for compressing tarballs, as it seems that somehow
CHECK_ALL missed couple of packages.

Fixes: 272f55e87f ("treewide: refresh hashes after move to use ZSTD as default")
Signed-off-by: Robert Marko <robimarko@gmail.com>
2024-04-08 09:30:35 +02:00
Adam Duskett 298faf91bc ovpn-dco: bump version to 0.2.20240320
Fixes builds against kernel 6.6

Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
2024-04-07 20:42:39 -07:00
Daniel Golle e8600462c7 exim: update to 4.97.1
IPv6 has accidentally been disabled in all Exim builds since the
package was introduced in OpenWrt due to a faulty `sed` script. This
has now been fixed, so beware that IPv6 is now enabled when updating
from previous releases.

Upstream changes since version 4.96.2 (bottom up):

JH/s1 Refuse to accept a line "dot, LF" as end-of-DATA unless operating in
      LF-only mode (as detected from the first header line).  Previously we did
      accept that in (normal) CRLF mode; this has been raised as a possible
      attack scenario (under the name "smtp smuggling", CVE-2023-51766).

JH/01 The hosts_connection_nolog main option now also controls "no MAIL in
      SMTP connection" log lines.

JH/02 Option default value updates:
        - queue_fast_ramp (main)        true (was false)
        - remote_max_parallel (main)    4 (was 2)

JH/03 Cache static regex pattern compilations, for use by ACLs.

JH/04 Bug 2903: avoid exit on an attempt to rewrite a malformed address.
      Make the rewrite never match and keep the logging.  Trust the
      admin to be using verify=header-syntax (to actually reject the message).

JH/05 Follow symlinks for placing a watch on TLS creds files.  This means
      (under Linux) we watch the dir containing the final file; previously
      it would be the dir with the first symlink.  We still do not monitor
      the entire path.

JH/06 Check for bad chars in rDNS for sender_host_name.  The OpenBSD (at least)
      dn_expand() is happy to pass them through.

JH/07 OpenSSL Fix auto-reload of changed server OCSP proof.  Previously, if
      the file with the proof had an unchanged name, the new proof(s) were
      loaded on top of the old ones (and nover used; the old ones were stapled).

JH/08 Bug 2915: Fix use-after-free for $regex<n> variables. Previously when
      more than one message arrived in a single connection a reference from
      the earlier message could be re-used.  Often a sigsegv resulted.
      These variables were introduced in Exim 4.87.
      Debug help from Graeme Fowler.

JH/09 Fix ${filter } for conditions that modify $value.  Previously the
      modified version would be used in construction the result, and a memory
      error would occur.

JH/10 GnuTLS: fix for (IOT?) clients offering no TLS extensions at all.
      Find and fix by Jasen Betts.

JH/11 OpenSSL: fix for ancient clients needing TLS support for versions earlier
      than TLSv1,2,  Previously, more-recent versions of OpenSSL were permitting
      the systemwide configuration to override the Exim config.

HS/01 Bug 2728: Introduce EDITME option "DMARC_API" to work around incompatible
      API changes in libopendmarc.

JH/12 Bug 2930: Fix daemon startup.  When started from any process apart from
      pid 1, in the normal "background daemon" mode, having to drop process-
      group leadership also lost track of needing to create listener sockets.

JH/13 Bug 2929: Fix using $recipients after ${run...}.  A change made for 4.96
      resulted in the variable appearing empty.  Find and fix by Ruben Jenster.

JH/14 Bug 2933: Fix regex substring match variables for null matches. Since 4.96
      a capture group which obtained no text (eg. "(abc)*" matching zero
      occurrences) could cause a segfault if the corresponding $<n> was
      expanded.

JH/15 Fix argument parsing for ${run } expansion. Previously, when an argument
      included a close-brace character (eg. it itself used an expansion) an
      error occurred.

JH/16 Move running the smtp connect ACL to before, for TLS-on-connect ports,
      starting TLS.  Previously it was after, meaning that attackers on such
      ports had to be screened using the host_reject_connection main config
      option. The new sequence aligns better with the STARTTLS behaviour, and
      permits defences against crypto-processing load attacks, even though it
      is strictly an incompatible change.
      Also, avoid sending any SMTP fail response for either the connect ACL
      or host_reject_connection, for TLS-on-connect ports.

JH/17 Permit the ACL "encrypted" condition to be used in a HELO/EHLO ACL,
      Previously this was not permitted, but it makes reasonable sense.
      While there, restore a restriction on using it from a connect ACL; given
      the change JH/16 it could only return false (and before 4.91 was not
      permitted).

JH/18 Fix a fencepost error in logging.  Previously (since 4.92) when a log line
      was exactly sized compared to the log buffer, a crash occurred with the
      misleading message "bad memory reference; pool not found".
      Found and traced by Jasen Betts.

JH/19 Bug 2911: Fix a recursion in DNS lookups.  Previously, if the main option
      dns_again_means_nonexist included an element causing a DNS lookup which
      itself returned DNS_AGAIN, unbounded recursion occurred.  Possible results
      included (though probably not limited to) a process crash from stack
      memory limit, or from excessive open files.  Replace this with a paniclog
      whine (as this is likely a configuration error), and returning
      DNS_NOMATCH.

JH/20 Bug 2954: (OpenSSL) Fix setting of explicit EC curve/group.  Previously
      this always failed, probably leading to the usual downgrade to in-clear
      connections.

JH/21 Fix TLSA lookups.  Previously dns_again_means_nonexist would affect
      SERVFAIL results, which breaks the downgrade resistance of DANE.  Change
      to not checking that list for these lookups.

JH/22 Bug 2434: Add connection-elapsed "D=" element to more connection
      closure log lines.

JH/23 Fix crash in string expansions. Previously, if an empty variable was
      immediately followed by an expansion operator, a null-indirection read
      was done, killing the process.

JH/24 Bug 2997: When built with EXPERIMENTAL_DSN_INFO, bounce messages can
      include an SMTP response string which is longer than that supported
      by the delivering transport.  Alleviate by wrapping such lines before
      column 80.

JH/25 Bug 2827: Restrict size of References: header in bounce messages to 998
      chars (RFC limit).  Previously a limit of 12 items was made, which with
      a not-impossible References: in the message being bounced could still
      be over-large and get stopped in the transport.

JH/26 For a ${readsocket } in TLS mode, send a TLS Close Alert before the TCP
      close.  Previously a bare socket close was done.

JH/27 Fix ${srs_encode ..}.  Previously it would give a bad result for one day
      every 1024 days.

JH/28 Bug 2996: Fix a crash in the smtp transport.  When finding that the
      message being considered for delivery was already being handled by
      another process, and having an SMTP connection already open, the function
      to close it tried to use an uninitialized variable.  This would afftect
      high-volume sites more, especially when running mailing-list-style loads.
      Pollution of logs was the major effect, as the other process delivered
      the message.  Found and partly investigated by Graeme Fowler.

JH/29 Change format of the internal ID used for message identification. The old
      version only supported 31 bits for a PID element; the new 64 (on systems
      which can use Base-62 encoding, which is all currently supported ones
      but not Darwin (MacOS) or Cygwin, which have case-insensitive filesystems
      and must use Base-36).  The new ID is 23 characters rather than 16, and is
      visible in various places - notably logs, message headers, and spool file
      names.  Various of the ancillary utilities also have to know the format.
        As well as the expanded PID portion, the sub-second part of the time
      recorded in the ID is expanded to support finer precision.  Theoretically
      this permits a receive rate from a single comms channel of better than the
      previous 2000/sec.
        The major timestamp part of the ID is not changed; at 6 characters it is
      usable until about year 3700.
        Updating from previously releases is fully supported: old-format spool
      files are still usable, and the utilities support both formats.  New
      message will use the new format.  The one hints-DB file type which uses
      message-IDs (the transport wait- DB) will be discarded if an old-format ID
      is seen; new ones will be built with only new-format IDs.
      Optionally, a utility can be used to convert spool files from old to new,
      but this is only an efficiency measure not a requirement for operation
        Downgrading from new to old requires running a provided utility, having
      first stopped all operations.  This will convert any spool files from new
      back to old (losing time-precision and PID information) and remove any
      wait- hints databases.

JH/30 Bug 3006: Fix handling of JSON strings having embedded commas. Previously
      we treated them as item separators when parsing for a list item, but they
      need to be protected by the doublequotes.  While there, add handling for
      backslashes.

JH/31 Bug 2998: Fix ${utf8clean:...} to disallow UTF-16 surrogate codepoints.
      Found and fixed by Jasen Betts. No testcase for this as my usual text
      editor insists on emitting only valid UTF-8.

JH/32 Fix "tls_dhparam = none" under GnuTLS.  At least with 3.7.9 this gave
      a null-indirection SIGSEGV for the receive process.

JH/33 Fix free for live variable $value created by a ${run ...} expansion during
      -bh use.  Internal checking would spot this and take a panic.

JH/34 Bug 3013: Fix use of $recipients within arguments for ${run...}.
      In 4.96 this would expand to empty.

JH/35 Bug 3014: GnuTLS: fix expiry date for an auto-generated server
      certificate.  Find and fix by Andreas Metzler.

JH/36 Add ARC info to DMARC hostory records.

JH/37 Bug 3016: Avoid sending DSN when message was accepted under fakereject
      or fakedefer.  Previously the sender could discover that the message
      had in fact been accepted.

JH/38 Taint-track intermediate values from the peer in multi-stage authentation
      sequences.  Previously the input was not noted as being tainted; notably
      this resulted in behaviour of LOGIN vs. PLAIN being inconsistent under
      bad coding of authenticators.

JH/39 Bug 3023: Fix crash induced by some combinations of zero-length strings
      and ${tr...}.  Found and diagnosed by Heiko Schlichting.

JH/40 Bug 2999: Fix a possible OOB write in the external authenticator, which
      CVE-2023-42115

JH/41 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42116

JH/42 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42114

JH/43 Bug 2903: avoid exit on an attempt to rewrite a malformed address.
      Make the rewrite never match and keep the logging.  Trust the
      admin to be using verify=header-syntax (to actually reject the message).

JH/44 Bug 3033: Harden dnsdb lookups against crafted DNS responses.
      CVE-2023-42219
      could be triggered by externally-supplied input.  Found by Trend Micro.
      CVE-2023-42115

JH/41 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42116

JH/42 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42114

JH/43 Bug 2903: avoid exit on an attempt to rewrite a malformed address.
      Make the rewrite never match and keep the logging.  Trust the
      admin to be using verify=header-syntax (to actually reject the message).

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2024-04-08 02:30:07 +01:00
krant c91947b4ec hwdata: update to 0.381
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-07 16:00:37 -07:00
源 文雨 254ae42faa base16384: bump to version 2.3.1
Signed-off-by: 源 文雨 <fumiama@foxmail.com>
2024-04-07 16:00:19 -07:00
Tan Zien 9c7a973a50 glib2: link libiconv when building host pkg
some compile error happens when building.
Linking to libiconv-full fixes this.
refer to: 63dd14b906

Signed-off-by: Tan Zien <nabsdh9@gmail.com>
2024-04-07 15:59:27 -07:00
krant 1a70cf2f3b libpng: update to 1.6.43
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-07 15:58:56 -07:00
krant c0273a1c38 openblas: update to 0.3.27
- Add ONLY_CBLAS make flag to skip tests (fixes x86 builds)

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-07 23:34:38 +03:00
krant 96ee052fba numpy: update to 1.26.4
- Refresh patches

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-04-07 17:04:37 +03:00
Robert Marko 272f55e87f treewide: refresh hashes after move to use ZSTD as default
With the recent move to using ZSTD as the default compression format
for packaging git repo clones we must refresh all of the hashes for
the packages feed as well.

Signed-off-by: Robert Marko <robimarko@gmail.com>
2024-04-07 12:06:34 +02:00
Hirokazu MORIKAWA ca3209a3b3 node: April 3, 2024 Security Releases
This is a security release
Notable Changes
* CVE-2024-27983 - Assertion failed in node::http2::Http2Session::~Http2Session() leads to HTTP/2 server crash- (High)
* CVE-2024-27982 - HTTP Request Smuggling via Content Length Obfuscation - (Medium)
* llhttp version 9.2.1
* undici version 5.28.4

Changed to use gz according to main-snapshot

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2024-04-07 18:01:08 +08:00
Josef Schlehofer 7aa736482d
Merge pull request #23831 from jonasjelonek/croc-9.6.15
croc: update to 9.6.15
2024-04-07 09:41:44 +02:00
Rosen Penev d0088b57d1 libmad: fix PKG_VERSION after apk change
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2024-04-06 16:36:35 -07:00
Jonas Jelonek 6e5a8e7973
croc: update to 9.6.15
changelogs:
9.6.13: https://github.com/schollz/croc/releases/tag/v9.6.13
9.6.14: https://github.com/schollz/croc/releases/tag/v9.6.14
9.6.15: https://github.com/schollz/croc/releases/tag/v9.6.15

Signed-off-by: Jonas Jelonek <jelonek.jonas@gmail.com>
2024-04-06 22:35:30 +02:00
Hannu Nyman fce373144e ttymidi-sysex: refresh dirty patch
CI in PR #23827 noticed a dirty patch in ttymidi-sysex.
Refresh the patch.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2024-04-06 21:35:15 +03:00
Andrea Pesaresi 9cf0eae9bc ksmbd-tools: update to version 3.5.2
Major changes are:
 - Add durable handles parameter to ksmbd.conf.
 - Add payload_sz in ksmbd_share_config_response to validate ipc
   response.
 - Fix UAF and cleanups.

Signed-off-by: Andrea Pesaresi <andreapesaresi82@gmail.com>
2024-04-06 19:23:09 +03:00
Christian Marangi 88fdab5d77
nginx: add patch to fix compilation error on mips targets
Add patch to fix compilation error on mips targets. This was triggered
after enabling LTO. It was discovered that -fPIC is enabled on building
dynamic modules in CFLAGS but was missing on linking them. This patch
adds the missing -fPIC also on linking.

Fixes: 3b13b08ad9 ("nginx: Fix compilation with LTO")
Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-04-06 17:02:58 +02:00
Christian Marangi 9d809674e3
nginx: drop redundant --with-cc-opt configure arg
Drop redundant --with-cc-opt configure arg to mute warning of
cc1: note: someone does not honour COPTS correctly, passed 2 times.

CFLAGS are already parsed and correctly applied without this option and
adding it just makes the CFLAGS appended twice.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-04-06 16:56:14 +02:00
Shi JiaYang 6095a031cd golang: update to 1.22.2
go1.22.2 (released 2024-04-03) includes a security fix to the
net/http package, as well as bug fixes to the compiler, the
go command, the linker, and the encoding/gob, go/types,
net/http, and runtime/trace packages.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.22.2
Find out more:
https://github.com/golang/go/issues?q=milestone%3AGo1.22.2

Signed-off-by: Shi JiaYang <shi05275@163.com>
2024-04-06 10:21:41 +08:00
Fabian Lipken 9278e7d624 fx: update to 34.0.0
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
2024-04-05 17:35:46 -07:00