Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package go1.26 for openSUSE:Factory checked 
in at 2026-02-11 18:48:22
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/go1.26 (Old)
 and      /work/SRC/openSUSE:Factory/.go1.26.new.1670 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "go1.26"

Wed Feb 11 18:48:22 2026 rev:4 rq:1332369 version:1.26.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/go1.26/go1.26.changes    2026-02-09 
19:30:16.115491058 +0100
+++ /work/SRC/openSUSE:Factory/.go1.26.new.1670/go1.26.changes  2026-02-11 
18:49:08.402114416 +0100
@@ -1,0 +2,464 @@
+Tue Feb 10 19:27:55 UTC 2026 - Jeff Kowalczyk <[email protected]>
+
+- go1.26.0 (released 2026-02-10) is a major release of Go.
+  go1.26.x minor releases will be provided through February 2027.
+  https://github.com/golang/go/wiki/Go-Release-Cycle
+  go1.26 arrives six months after Go 1.25. Most of its changes are
+  in the implementation of the toolchain, runtime, and
+  libraries. As always, the release maintains the Go 1 promise of
+  compatibility. We expect almost all Go programs to continue to
+  compile and run as before.
+  Refs boo#1255111 go1.26 release tracking
+  * Language change: The built-in new function, which creates a new
+    variable, now allows its operand to be an expression,
+    specifying the initial value of the variable.
+  * Language change: The restriction that a generic type may not
+    refer to itself in its type parameter list has been lifted. It
+    is now possible to specify type constraints that refer to the
+    generic type being constrained.
+  * go command: The venerable go fix command has been completely
+    revamped and is now the home of Go’s modernizers. It provides a
+    dependable, push-button way to update Go code bases to the
+    latest idioms and core library APIs. The initial suite of
+    modernizers includes dozens of fixers to make use of modern
+    features of the Go language and library, as well a source-level
+    inliner that allows users to automate their own API migrations
+    using //go:fix inline directives. These fixers should not
+    change the behavior of your program, so if you encounter any
+    issues with a fix performed by go fix, please report it.
+  * go command: The rewritten go fix command builds atop the exact
+    same Go analysis framework as go vet. This means the same
+    analyzers that provide diagnostics in go vet can be used to
+    suggest and apply fixes in go fix. The go fix command’s
+    historical fixers, all of which were obsolete, have been
+    removed.
+  * go command: Two upcoming Go blog posts will go into more detail
+    on modernizers, the inliner, and how to get the most out of go
+    fix.
+  * go command: go mod init now defaults to a lower go version in
+    new go.mod files. Running go mod init using a toolchain of
+    version 1.N.X will create a go.mod file specifying the Go
+    version go 1.(N-1).0. Pre-release versions of 1.N will create
+    go.mod files specifying go 1.(N-2).0. For example, the Go 1.26
+    release candidates will create go.mod files with go 1.24.0, and
+    Go 1.26 and its minor releases will create go.mod files with go
+    1.25.0. This is intended to encourage the creation of modules
+    that are compatible with currently supported versions of
+    Go. For additional control over the go version in new modules,
+    go mod init can be followed up with go get go@version.
+  * go command: cmd/doc, and go tool doc have been deleted. go doc
+    can be used as a replacement for go tool doc: it takes the same
+    flags and arguments and has the same behavior.
+  * pprof: The pprof tool web UI, enabled with the -http flag, now
+    defaults to the flame graph view. The previous graph view is
+    available in the “View -> Graph” menu, or via /ui/graph.
+  * Runtime: The new Green Tea garbage collector, previously
+    available as an experiment in Go 1.25, is now enabled by
+    default after incorporating feedback. This garbage collector’s
+    design improves the performance of marking and scanning small
+    objects through better locality and CPU scalability. Benchmark
+    results vary, but we expect somewhere between a 10–40%
+    reduction in garbage collection overhead in real-world programs
+    that heavily use the garbage collector. Further improvements,
+    on the order of 10% in garbage collection overhead, are
+    expected when running on newer amd64-based CPU platforms (Intel
+    Ice Lake or AMD Zen 4 and newer), as the garbage collector now
+    leverages vector instructions for scanning small objects when
+    possible. The new garbage collector may be disabled by setting
+    GOEXPERIMENT=nogreenteagc at build time. This opt-out setting
+    is expected to be removed in Go 1.27. If you disable the new
+    garbage collector for any reason related to its performance or
+    behavior, please file an issue.
+  * Runtime: cgo: The baseline runtime overhead of cgo calls has
+    been reduced by ~30%.
+  * Runtime: Heap base address randomization: On 64-bit platforms,
+    the runtime now randomizes the heap base address at
+    startup. This is a security enhancement that makes it harder
+    for attackers to predict memory addresses and exploit
+    vulnerabilities when using cgo. This feature may be disabled by
+    setting GOEXPERIMENT=norandomizedheapbase64 at build time. This
+    opt-out setting is expected to be removed in a future Go
+    release.
+  * Runtime: Experimental goroutine leak profile: A new profile
+    type that reports leaked goroutines is now available as an
+    experiment. The new profile type, named goroutineleak in the
+    runtime/pprof package, may be enabled by setting
+    GOEXPERIMENT=goroutineleakprofile at build time. Enabling the
+    experiment also makes the profile available as a net/http/pprof
+    endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a
+    goroutine blocked on some concurrency primitive (channels,
+    sync.Mutex, sync.Cond, etc) that cannot possibly become
+    unblocked. The runtime detects leaked goroutines using the
+    garbage collector: if a goroutine G is blocked on concurrency
+    primitive P, and P is unreachable from any runnable goroutine
+    or any goroutine that those could unblock, then P cannot be
+    unblocked, so goroutine G can never wake up. While it is
+    impossible to detect permanently blocked goroutines in all
+    cases, this approach detects a large class of such
+    leaks. Because this technique builds on reachability, the
+    runtime may fail to identify leaks caused by blocking on
+    concurrency primitives reachable through global variables or
+    the local variables of runnable goroutines. Special thanks to
+    Vlad Saioc at Uber for contributing this work. The underlying
+    theory is presented in detail in a publication by Saioc et
+    al. The implementation is production-ready, and is only
+    considered an experiment for the purposes of collecting
+    feedback on the API, specifically the choice to make it a new
+    profile. The feature is also designed to not incur any
+    additional run-time overhead unless it is actively in-use. We
+    encourage users to try out the new feature in the Go
+    playground, in tests, in continuous integration, and in
+    production. We welcome additional feedback on the proposal
+    issue. We aim to enable goroutine leak profiles by default in
+    Go 1.27.
+  * Compiler: The compiler can now allocate the backing store for
+    slices on the stack in more situations, which improves
+    performance. If this change is causing trouble, the bisect tool
+    can be used to find the allocation causing trouble using the
+    -compile=variablemake flag. All such new stack allocations can
+    also be turned off using -gcflags=all=-d=variablemakehash=n. If
+    you encounter issues with this optimization, please file an
+    issue.
+  * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),
+    the linker now supports internal linking mode of cgo programs,
+    which can be requested with the -ldflags=-linkmode=internal
+    flag.
+  * Linker: There are several minor changes to executable
+    files. These changes do not affect running Go programs. They
+    may affect programs that analyze Go executables, and they may
+    affect people who use external linking mode with custom linker
+    scripts.
+  * Linker: The moduledata structure is now in its own section,
+    named .go.module.
+  * Linker: The moduledata cutab field, which is a slice, now has
+    the correct length; previously the length was four times too
+    large.
+  * Linker: The pcHeader found at the start of the .gopclntab
+    section no longer records the start of the text section. That
+    field is now always zero.
+  * Linker: That pcHeader change was made so that the .gopclntab
+    section no longer contains any relocations. On platforms that
+    support relro, the section has moved from the relro segment to
+    the rodata segment.
+  * Linker: The funcdata symbols and the findfunctab have moved
+    from the .rodata section to the .gopclntab section.
+  * Linker: The .gosymtab section has been removed. It was
+    previously always present but empty.
+  * Linker: When using internal linking, ELF sections now appear in
+    the section header list sorted by address. The previous order
+    was somewhat unpredictable.
+  * Linker: The references to section names here use the ELF names
+    as seen on Linux and other systems. The Mach-O names as seen on
+    Darwin start with a double underscore and do not contain any
+    dots.
+  * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26
+    now requires Go 1.24.6 or later for bootstrap. We expect that
+    Go 1.28 will require a minor release of Go 1.26 or later for
+    bootstrap.
+  * Standard Library: New crypto/hpke package: The new crypto/hpke
+    package implements Hybrid Public Key Encryption (HPKE) as
+    specified in RFC 9180, including support for post-quantum
+    hybrid KEMs.
+  * Standard Library: New experimental simd/archsimd package: Go
+    1.26 introduces a new experimental simd/archsimd package, which
+    can be enabled by setting the environment variable
+    GOEXPERIMENT=simd at build time. This package provides access
+    to architecture-specific SIMD operations. It is currently
+    available on the amd64 architecture and supports 128-bit,
+    256-bit, and 512-bit vector types, such as Int8x16 and
+    Float64x8, with operations such as Int8x16.Add. The API is not
+    yet considered stable. We intend to provide support for other
+    architectures in future versions, but the API intentionally
+    architecture-specific and thus non-portable. In addition, we
+    plan to develop a high-level portable SIMD package in the
+    future.
+  * Standard Library: New experimental runtime/secret package: The
+    new runtime/secret package is available as an experiment, which
+    can be enabled by setting the environment variable
+    GOEXPERIMENT=runtimesecret at build time. It provides a
+    facility for securely erasing temporaries used in code that
+    manipulates secret information—typically cryptographic in
+    nature—such as registers, stack, new heap allocations. This
+    package is intended to make it easier to ensure forward
+    secrecy. It currently supports the amd64 and arm64
+    architectures on Linux.
+  * bytes: The new Buffer.Peek method returns the next n bytes from
+    the buffer without advancing it.
+  * crypto: The new Encapsulator and Decapsulator interfaces allow
+    accepting abstract KEM encapsulation or decapsulation keys.
+  * crypto/dsa: The random parameter to GenerateKey is now
+    ignored. Instead, it now always uses a secure source of
+    cryptographically random bytes. For deterministic testing, use
+    the new testing/cryptotest.SetGlobalRandom function. The new
+    GODEBUG setting cryptocustomrand=1 temporarily restores the old
+    behavior.
+  * crypto/ecdh: The random parameter to Curve.GenerateKey is now
+    ignored. Instead, it now always uses a secure source of
+    cryptographically random bytes. For deterministic testing, use
+    the new testing/cryptotest.SetGlobalRandom function. The new
+    GODEBUG setting cryptocustomrand=1 temporarily restores the old
+    behavior. The new KeyExchanger interface, implemented by
+    PrivateKey, makes it possible to accept abstract ECDH private
+    keys, e.g. those implemented in hardware.
+  * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey
+    are now deprecated. The random parameter to GenerateKey,
+    SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,
+    they now always use a secure source of cryptographically random
+    bytes. For deterministic testing, use the new
+    testing/cryptotest.SetGlobalRandom function. The new GODEBUG
+    setting cryptocustomrand=1 temporarily restores the old
+    behavior.
+  * crypto/ed25519: If the random parameter to GenerateKey is nil,
+    GenerateKey now always uses a secure source of
+    cryptographically random bytes, instead of crypto/rand.Reader
+    (which could have been overridden). The new GODEBUG setting
+    cryptocustomrand=1 temporarily restores the old behavior.
+  * crypto/fips140: The new WithoutEnforcement and Enforced
+    functions now allow running in GODEBUG=fips140=only mode while
+    selectively disabling the strict FIPS 140-3 checks. Version
+    returns the resolved FIPS 140-3 Go Cryptographic Module version
+    when building against a frozen module with GOFIPS140.
+  * crypto/mlkem: The new DecapsulationKey768.Encapsulator and
+    DecapsulationKey1024.Encapsulator methods implement the new
+    crypto.Decapsulator interface.
+  * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package
+    exposes the Encapsulate768 and Encapsulate1024 functions which
+    implement derandomized ML-KEM encapsulation, for use with
+    known-answer tests.
+  * crypto/rand: The random parameter to Prime is now
+    ignored. Instead, it now always uses a secure source of
+    cryptographically random bytes. For deterministic testing, use
+    the new testing/cryptotest.SetGlobalRandom function. The new
+    GODEBUG setting cryptocustomrand=1 temporarily restores the old
+    behavior.
+  * crypto/rsa: The new EncryptOAEPWithOptions function allows
+    specifying different hash functions for OAEP padding and MGF1
+    mask generation.
+  * crypto/rsa: The random parameter to GenerateKey,
+    GenerateMultiPrimeKey, and EncryptPKCS1v15 is now
+    ignored. Instead, they now always use a secure source of
+    cryptographically random bytes. For deterministic testing, use
+    the new testing/cryptotest.SetGlobalRandom function. The new
+    GODEBUG setting cryptocustomrand=1 temporarily restores the old
+    behavior.
+  * crypto/rsa: If PrivateKey fields are modified after calling
+    PrivateKey.Precompute, PrivateKey.Validate now fails.
+  * crypto/rsa: PrivateKey.D is now checked for consistency with
+    precomputed values, even if it is not used.
+  * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented
+    by EncryptPKCS1v15, DecryptPKCS1v15, and
+    DecryptPKCS1v15SessionKey) is now deprecated.
+  * crypto/subtle: The WithDataIndependentTiming function no longer
+    locks the calling goroutine to the OS thread while executing
+    the passed function. Additionally, any goroutines which are
+    spawned during the execution of the passed function and their
+    descendants now inherit the properties of
+    WithDataIndependentTiming for their lifetime. This change also
+    affects cgo in the following ways:
+  * crypto/subtle: Any C code called via cgo from within the
+    function passed to WithDataIndependentTiming, or from a
+    goroutine spawned by the function passed to
+    WithDataIndependentTiming and its descendants, will also have
+    data independent timing enabled for the duration of the
+    call. If the C code disables data independent timing, it will
+    be re-enabled on return to Go.
+  * crypto/subtle: If C code called via cgo, from the function
+    passed to WithDataIndependentTiming or elsewhere, enables or
+    disables data independent timing then calling into Go will
+    preserve that state for the duration of the call.
+  * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024
+    post-quantum key exchanges are now enabled by default. They can
+    be disabled by setting Config.CurvePreferences or with the
+    tlssecpmlkem=0 GODEBUG setting.
+  * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field
+    indicates if the ClientHello was sent in response to a
+    HelloRetryRequest message. The new
+    ConnectionState.HelloRetryRequest field indicates if the server
+    sent a HelloRetryRequest, or if the client received a
+    HelloRetryRequest, depending on connection role.
+  * crypto/tls: The QUICConn type used by QUIC implementations
+    includes a new event for reporting TLS handshake errors.
+  * crypto/tls: If Certificate.PrivateKey implements
+    crypto.MessageSigner, its SignMessage method is used instead of
+    Sign in TLS 1.2 and later.
+  * crypto/tls: The following GODEBUG settings introduced in Go
+    1.22 and Go 1.23 will be removed in the next major Go
+    release. Starting in Go 1.27, the new behavior will apply
+    regardless of GODEBUG setting or go.mod language version.
+  * crypto/tls: GODEBUG tlsunsafeekm:
+    ConnectionState.ExportKeyingMaterial will require TLS 1.3 or
+    Extended Master Secret.
+  * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges
+    without ECDH won’t be enabled by default.
+  * crypto/tls: GODEBUG tls10server: the default minimum TLS
+    version for both clients and servers will be TLS 1.2.
+  * crypto/tls: GODEBUG tls3des: the default cipher suites will not
+    include 3DES.
+  * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and
++++ 167 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/go1.26/go1.26.changes
++++ and /work/SRC/openSUSE:Factory/.go1.26.new.1670/go1.26.changes

Old:
----
  go1.26rc3.src.tar.gz

New:
----
  go1.26.0.src.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ go1.26.spec ++++++
--- /var/tmp/diff_new_pack.AdoOf5/_old  2026-02-11 18:49:10.542204288 +0100
+++ /var/tmp/diff_new_pack.AdoOf5/_new  2026-02-11 18:49:10.554204792 +0100
@@ -107,7 +107,7 @@
 %endif
 
 Name:           go1.26
-Version:        1.26rc3
+Version:        1.26.0
 Release:        0
 Summary:        A compiled, garbage-collected, concurrent programming language
 License:        BSD-3-Clause

++++++ go1.26rc3.src.tar.gz -> go1.26.0.src.tar.gz ++++++
/work/SRC/openSUSE:Factory/go1.26/go1.26rc3.src.tar.gz 
/work/SRC/openSUSE:Factory/.go1.26.new.1670/go1.26.0.src.tar.gz differ: char 
111, line 1

Reply via email to