From: Russ Cox Date: Thu, 18 Jan 2018 15:22:11 +0000 (-0500) Subject: doc/go1.10: address final TODOs X-Git-Tag: go1.10rc1~21 X-Git-Url: http://www.git.cypherpunks.su/?a=commitdiff_plain;h=21a460d3ab53de0ebe6f7ba6dd995caccfe21c57;p=gostls13.git doc/go1.10: address final TODOs Change-Id: Id71c1ccb584fb308f1615c0ed1255cc8b44bf675 Reviewed-on: https://go-review.googlesource.com/88256 Run-TryBot: Russ Cox Reviewed-by: Brad Fitzpatrick --- diff --git a/doc/go1.10.html b/doc/go1.10.html index 1f0d045696..a7371739df 100644 --- a/doc/go1.10.html +++ b/doc/go1.10.html @@ -30,7 +30,11 @@ We expect almost all Go programs to continue to compile and run as before.

-OVERVIEW HERE +This release improves caching of built packages, +adds caching of successful test results, +runs vet automatically during tests, +and +permits passing string values directly between Go and C using cgo.

Changes to the language

@@ -271,7 +275,13 @@ Go structs and Go arrays are not supported in the type signatures of cgo-exporte

-TODO: CL 70890 "permit passing string values directly between Go and C." +Cgo now supports direct access to Go string values from C. +Functions in the C preamble may use the type _GoString_ +to accept a Go string as an argument. +C code may call _GoStringLen and _GoStringPtr +for direct access to the contents of the string. +A value of type _GoString_ +may be passed in a call to an exported Go function that takes an argument of Go type string.

@@ -545,7 +555,11 @@ to avoid clearing the condition flags unexpectedly.

Gccgo

-TODO: Words about GCC 8 and Go 1.10. +Due to the alignment of Go's semiannual release schedule with GCC's +annual release schedule, +GCC release 7 contains the Go 1.8.3 version of gccgo. +We expect that the next release, GCC 8, will contain the Go 1.10 +version of gccgo.

Runtime

@@ -756,13 +770,13 @@ them unless explicitly advertised.
crypto/x509

-Leaf certificate validation now enforces the name constraints for all +Certificate.Verify +now enforces the name constraints for all names contained in the certificate, not just the one name that a client has asked about. Extended key usage restrictions are similarly now checked all at once. As a result, after a certificate has been validated, now it can be trusted in its entirety. It is no longer necessary to revalidate the certificate for each additional name or key usage. -TODO: Link to docs that may not exist yet.