From 6b504b9c2d517b4ff6250c8e33c64ca092e1e5c3 Mon Sep 17 00:00:00 2001 From: Pablo Greco Date: Jul 16 2019 21:00:26 +0000 Subject: Disable tests in armhfp for commit 1 Signed-off-by: Johnny Hughes --- diff --git a/.gitignore b/.gitignore index 623b82d..57ce097 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -SOURCES/go-go1.11.5-openssl-1.1.tar.gz +SOURCES/go1.11-openssl-1.1-fips.tar.gz diff --git a/.golang.metadata b/.golang.metadata index 8bde8f8..8718385 100644 --- a/.golang.metadata +++ b/.golang.metadata @@ -1 +1 @@ -9aba703a55e4c2a171866fb9658962342d1feeda SOURCES/go-go1.11.5-openssl-1.1.tar.gz +3bead9d9ca5a21395ff2cd7fea3ed2c4dca070cb SOURCES/go1.11-openssl-1.1-fips.tar.gz diff --git a/SOURCES/reject-control-chars.patch b/SOURCES/reject-control-chars.patch deleted file mode 100644 index 0033ad2..0000000 --- a/SOURCES/reject-control-chars.patch +++ /dev/null @@ -1,185 +0,0 @@ -From eb0f2b3d27a896e4b832f2450490a2bbf72fbb6c Mon Sep 17 00:00:00 2001 -From: Brad Fitzpatrick -Date: Thu, 31 Jan 2019 20:17:12 +0000 -Subject: [PATCH] [release-branch.go1.11] net/http, net/url: reject control - characters in URLs - -Cherry pick of combined CL 159157 + CL 160178. - -Fixes #29923 -Updates #27302 -Updates #22907 - -Change-Id: I6de92c14284595a58321a4b4d53229285979b872 -Reviewed-on: https://go-review.googlesource.com/c/160798 -Run-TryBot: Brad Fitzpatrick -TryBot-Result: Gobot Gobot -Reviewed-by: Ian Lance Taylor ---- - src/net/http/fs_test.go | 15 +++++++++++---- - src/net/http/http.go | 11 +++++++++++ - src/net/http/request.go | 7 ++++++- - src/net/http/requestwrite_test.go | 11 +++++++++++ - src/net/url/url.go | 15 +++++++++++++++ - src/net/url/url_test.go | 23 ++++++++++++++++++++++- - 6 files changed, 76 insertions(+), 6 deletions(-) - -diff --git a/src/net/http/fs_test.go b/src/net/http/fs_test.go -index 255d215f3cf..762e88b05ff 100644 ---- a/src/net/http/fs_test.go -+++ b/src/net/http/fs_test.go -@@ -583,16 +583,23 @@ func TestFileServerZeroByte(t *testing.T) { - ts := httptest.NewServer(FileServer(Dir("."))) - defer ts.Close() - -- res, err := Get(ts.URL + "/..\x00") -+ c, err := net.Dial("tcp", ts.Listener.Addr().String()) - if err != nil { - t.Fatal(err) - } -- b, err := ioutil.ReadAll(res.Body) -+ defer c.Close() -+ _, err = fmt.Fprintf(c, "GET /..\x00 HTTP/1.0\r\n\r\n") -+ if err != nil { -+ t.Fatal(err) -+ } -+ var got bytes.Buffer -+ bufr := bufio.NewReader(io.TeeReader(c, &got)) -+ res, err := ReadResponse(bufr, nil) - if err != nil { -- t.Fatal("reading Body:", err) -+ t.Fatal("ReadResponse: ", err) - } - if res.StatusCode == 200 { -- t.Errorf("got status 200; want an error. Body is:\n%s", string(b)) -+ t.Errorf("got status 200; want an error. Body is:\n%s", got.Bytes()) - } - } - -diff --git a/src/net/http/http.go b/src/net/http/http.go -index ce0eceb1de3..07ca78dbc84 100644 ---- a/src/net/http/http.go -+++ b/src/net/http/http.go -@@ -59,6 +59,17 @@ func isASCII(s string) bool { - return true - } - -+// stringContainsCTLByte reports whether s contains any ASCII control character. -+func stringContainsCTLByte(s string) bool { -+ for i := 0; i < len(s); i++ { -+ b := s[i] -+ if b < ' ' || b == 0x7f { -+ return true -+ } -+ } -+ return false -+} -+ - func hexEscapeNonASCII(s string) string { - newLen := 0 - for i := 0; i < len(s); i++ { -diff --git a/src/net/http/request.go b/src/net/http/request.go -index a40b0a3cb83..e352386b083 100644 ---- a/src/net/http/request.go -+++ b/src/net/http/request.go -@@ -545,7 +545,12 @@ func (r *Request) write(w io.Writer, usingProxy bool, extraHeaders Header, waitF - // CONNECT requests normally give just the host and port, not a full URL. - ruri = host - } -- // TODO(bradfitz): escape at least newlines in ruri? -+ if stringContainsCTLByte(ruri) { -+ return errors.New("net/http: can't write control character in Request.URL") -+ } -+ // TODO: validate r.Method too? At least it's less likely to -+ // come from an attacker (more likely to be a constant in -+ // code). - - // Wrap the writer in a bufio Writer if it's not already buffered. - // Don't always call NewWriter, as that forces a bytes.Buffer -diff --git a/src/net/http/requestwrite_test.go b/src/net/http/requestwrite_test.go -index eb65b9f736f..3daab4b8b7b 100644 ---- a/src/net/http/requestwrite_test.go -+++ b/src/net/http/requestwrite_test.go -@@ -512,6 +512,17 @@ var reqWriteTests = []reqWriteTest{ - "User-Agent: Go-http-client/1.1\r\n" + - "\r\n", - }, -+ -+ 21: { -+ Req: Request{ -+ Method: "GET", -+ URL: &url.URL{ -+ Host: "www.example.com", -+ RawQuery: "new\nline", // or any CTL -+ }, -+ }, -+ WantError: errors.New("net/http: can't write control character in Request.URL"), -+ }, - } - - func TestRequestWrite(t *testing.T) { -diff --git a/src/net/url/url.go b/src/net/url/url.go -index 80eb7a86c8d..8d2a8566998 100644 ---- a/src/net/url/url.go -+++ b/src/net/url/url.go -@@ -494,6 +494,10 @@ func parse(rawurl string, viaRequest bool) (*URL, error) { - var rest string - var err error - -+ if stringContainsCTLByte(rawurl) { -+ return nil, errors.New("net/url: invalid control character in URL") -+ } -+ - if rawurl == "" && viaRequest { - return nil, errors.New("empty url") - } -@@ -1114,3 +1118,14 @@ func validUserinfo(s string) bool { - } - return true - } -+ -+// stringContainsCTLByte reports whether s contains any ASCII control character. -+func stringContainsCTLByte(s string) bool { -+ for i := 0; i < len(s); i++ { -+ b := s[i] -+ if b < ' ' || b == 0x7f { -+ return true -+ } -+ } -+ return false -+} -diff --git a/src/net/url/url_test.go b/src/net/url/url_test.go -index 9043a844e88..369ea6cbd25 100644 ---- a/src/net/url/url_test.go -+++ b/src/net/url/url_test.go -@@ -1738,8 +1738,29 @@ func TestNilUser(t *testing.T) { - } - - func TestInvalidUserPassword(t *testing.T) { -- _, err := Parse("http://us\ner:pass\nword@foo.com/") -+ _, err := Parse("http://user^:passwo^rd@foo.com/") - if got, wantsub := fmt.Sprint(err), "net/url: invalid userinfo"; !strings.Contains(got, wantsub) { - t.Errorf("error = %q; want substring %q", got, wantsub) - } - } -+ -+func TestRejectControlCharacters(t *testing.T) { -+ tests := []string{ -+ "http://foo.com/?foo\nbar", -+ "http\r://foo.com/", -+ "http://foo\x7f.com/", -+ } -+ for _, s := range tests { -+ _, err := Parse(s) -+ const wantSub = "net/url: invalid control character in URL" -+ if got := fmt.Sprint(err); !strings.Contains(got, wantSub) { -+ t.Errorf("Parse(%q) error = %q; want substring %q", s, got, wantSub) -+ } -+ } -+ -+ // But don't reject non-ASCII CTLs, at least for now: -+ if _, err := Parse("http://foo.com/ctl\x80"); err != nil { -+ t.Errorf("error parsing URL with non-ASCII control byte: %v", err) -+ } -+ -+} diff --git a/SPECS/golang.spec b/SPECS/golang.spec index 324fe02..da12d0a 100644 --- a/SPECS/golang.spec +++ b/SPECS/golang.spec @@ -54,7 +54,7 @@ %endif # Controls what ever we fail on failed tests -%ifarch %{ix86} x86_64 %{arm} aarch64 ppc64le +%ifarch %{ix86} x86_64 aarch64 ppc64le %global fail_on_tests 1 %else %global fail_on_tests 0 @@ -101,12 +101,12 @@ Name: golang Version: 1.11.5 -Release: 2%{?dist} +Release: 1%{?dist} Summary: The Go Programming Language # source tree includes several copies of Mark.Twain-Tom.Sawyer.txt under Public Domain License: BSD and Public Domain URL: http://golang.org/ -Source0: https://pagure.io/go/archive/go1.11.5-openssl-1.1/go-go1.11.5-openssl-1.1.tar.gz +Source0: https://github.com/derekparker/go/archive/go1.11-openssl-1.1-fips.tar.gz # make possible to override default traceback level at build time by setting build tag rpm_crashtraceback Source1: fedora.go Source2: golang.macros @@ -139,7 +139,6 @@ Patch215: ./go1.5-zoneinfo_testing_only.patch # Proposed patch by jcajka https://golang.org/cl/86541 Patch221: fix_TestScript_list_std.patch -Patch222: reject-control-chars.patch # Having documentation separate was broken @@ -229,13 +228,12 @@ Requires: %{name} = %{version}-%{release} %endif %prep -%setup -q -n go-go1.11.5-openssl-1.1 +%setup -q -n go-go1.11-openssl-1.1-fips %patch215 -p1 %patch221 -p1 -%patch222 -p1 cp %{SOURCE1} ./src/runtime/ @@ -498,13 +496,6 @@ cd .. %endif %changelog -* Thu Apr 4 2019 Derek Parker - 1.11.5-2 -- Include patch to fix CVE-2019-9741 -- Resolves: rhbz#1690443 - -* Mon Feb 18 2019 Derek Parker - 1.11.5-2 -- Switch to pagure fork for Go FIPS - * Thu Feb 7 2019 Derek Parker - 1.11.5-1 - Rebase to Go 1.11.5 - Resolves: rhbz#1671277