-
Notifications
You must be signed in to change notification settings - Fork 17.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cmd/go: deprecate -insecure on go get #37519
Comments
I think we probably need to keep |
Does it make sense then to log something like “-insecure will be deprecated soon, please consider using GOINSECURE” when someone uses the -insecure flag? There is also the non-modules go get which doesn’t support GOINSECURE - https://github.com/golang/go/blob/master/src/cmd/go/internal/get/get.go#L391; is it worth back porting GOINSECURE into that or will that code disappear at some point? |
That's a very good idea. We could start doing that as soon as Go 1.15. |
Possibly both? It shouldn't be hard to retrofit |
I would be up for contributing to either / both of those. Should I change the proposal to focus on these features rather than deprecation? |
I think we should keep this issue focused on the proposed deprecation: we probably shouldn't warn about the flag if we aren't formally deprecating it, even if we decide to keep it for a while. If you want to go ahead and send a CL for |
Ok great, should I open a proposal for that or is it fine just to work on it given it’s providing feature parity with modules mode? |
Just a CL is fine. |
It sounds like this is on hold for having GOINSECURE apply in GOPATH mode, although it's unclear to me that significant changes to GOPATH mode would be worthwhile at this point. Please change back to Active once it is appropriate to consider the deprecation again. |
I am intending on looking into GOINSECURE for GOPATH, but life and now this whole virus thing are getting in the way of my free time currently 😂. I’ll be sure to let you know once my free time is back on track! |
Change https://golang.org/cl/229223 mentions this issue: |
Recommend use of GOINSECURE over -insecure flang and clarify that GOINSECURE environment variable does not also imply GONOSUMDB. Updates #37519 by adding documentation as discussed. Change-Id: Ia8ab6b3ed1aa559343b72e4ca76c372ee6bf1941 GitHub-Last-Rev: 8d86991 GitHub-Pull-Request: #38572 Reviewed-on: https://go-review.googlesource.com/c/go/+/229223 Reviewed-by: Bryan C. Mills <[email protected]> Reviewed-by: Jay Conrod <[email protected]> Run-TryBot: Bryan C. Mills <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
Change https://golang.org/cl/229758 mentions this issue: |
Adds support for the GOINSECURE environment variable to GOPATH mode. Updates #37519. Change-Id: Ibe3f52b7f30b1395edb000998905ee93abe6cada GitHub-Last-Rev: e298c00 GitHub-Pull-Request: #38628 Reviewed-on: https://go-review.googlesource.com/c/go/+/229758 Run-TryBot: Bryan C. Mills <[email protected]> TryBot-Result: Gobot Gobot <[email protected]> Reviewed-by: Bryan C. Mills <[email protected]>
GOINSECURE is now supported in GOPATH mode, but I'm not sure if I can remove the proposal-hold label to open this back up? |
Updates #37519. Change-Id: Iddf88a24334d4740f9c40caa2354127298692eeb GitHub-Last-Rev: deda4c8 GitHub-Pull-Request: #41545 Reviewed-on: https://go-review.googlesource.com/c/go/+/256419 Reviewed-by: Jay Conrod <[email protected]> Trust: Jay Conrod <[email protected]> Trust: Bryan C. Mills <[email protected]>
Yes, sorry about that! I got keen and put up the code changes because I didn't want to miss the code freeze. |
Change https://golang.org/cl/257157 mentions this issue: |
No change in consensus, so accepted. (@witchard, the code freeze is not for another month, for what it's worth.) |
Updates #37519 Change-Id: I212607f1839b729d7da24b1258e56997b13ad830 GitHub-Last-Rev: db6d3c8 GitHub-Pull-Request: #41613 Reviewed-on: https://go-review.googlesource.com/c/go/+/257157 Run-TryBot: Bryan C. Mills <[email protected]> TryBot-Result: Go Bot <[email protected]> Trust: Jay Conrod <[email protected]> Trust: Bryan C. Mills <[email protected]> Reviewed-by: Bryan C. Mills <[email protected]> Reviewed-by: Jay Conrod <[email protected]>
The go 1.16 modules blog (https://blog.golang.org/go116-module-changes) suggests that |
I think it makes sense to remove |
Change https://golang.org/cl/297709 mentions this issue: |
Following the addition of the
GOINSECURE
environment variable under #32966, it is now possible to select specific hosts to access insecurely when fetching dependencies. This is much neater than the-insecure
flag currently supported bygo get
which will download insecurely for any host.Given we now have
GOINSECURE
as of go 1.14, I propose the removal-insecure
from go get.#34568 is also potentially relevant, presumably the issue with
GIT_SSL_NO_VERIFY
still exists when usingGOINSECURE
.The text was updated successfully, but these errors were encountered: