-
Notifications
You must be signed in to change notification settings - Fork 18.5k
Open
Labels
ExpertNeededNeedsDecisionFeedback is required from experts, contributors, and/or the community before a change can be made.Feedback is required from experts, contributors, and/or the community before a change can be made.release-blocker
Milestone
Description
This is a tracking issue for doing an audit of API additions for Go 1.26 as of CL 726340.
New API changes for Go 1.26
bytes
method (*Buffer) Peek(int) ([]uint8, error)bytes: add Buffer.Peek #73794
crypto
type Decapsulator interface { Decapsulate, Encapsulator }crypto/hpke: new package #75300type Decapsulator interface, Decapsulate([]uint8) ([]uint8, error)crypto/hpke: new package #75300type Decapsulator interface, Encapsulator() Encapsulatorcrypto/hpke: new package #75300type Encapsulator interface { Bytes, Encapsulate }crypto/hpke: new package #75300type Encapsulator interface, Bytes() []uint8crypto/hpke: new package #75300type Encapsulator interface, Encapsulate() ([]uint8, []uint8)crypto/hpke: new package #75300
crypto/ecdh
type KeyExchanger interface { Curve, ECDH, PublicKey }crypto/hpke: new package #75300type KeyExchanger interface, Curve() Curvecrypto/hpke: new package #75300type KeyExchanger interface, ECDH(*PublicKey) ([]uint8, error)crypto/hpke: new package #75300type KeyExchanger interface, PublicKey() *PublicKeycrypto/hpke: new package #75300
crypto/ecdsa
type PrivateKey struct, D //deprecatedcrypto/ecdsa: add NewPublicKey and PublicKey.Bytes #63963type PublicKey struct, X //deprecatedcrypto/ecdsa: add NewPublicKey and PublicKey.Bytes #63963type PublicKey struct, Y //deprecatedcrypto/ecdsa: add NewPublicKey and PublicKey.Bytes #63963
crypto/fips140
func Enforced() boolcrypto/fips140: selective policy enforcement framework #74630func Version() stringcrypto/fips140: add Version #75301func WithoutEnforcement(func())crypto/fips140: selective policy enforcement framework #74630
crypto/hpke
func AES128GCM() AEADcrypto/hpke: new package #75300func AES256GCM() AEADcrypto/hpke: new package #75300func ChaCha20Poly1305() AEADcrypto/hpke: new package #75300func DHKEM(ecdh.Curve) KEMcrypto/hpke: new package #75300func ExportOnly() AEADcrypto/hpke: new package #75300func HKDFSHA256() KDFcrypto/hpke: new package #75300func HKDFSHA384() KDFcrypto/hpke: new package #75300func HKDFSHA512() KDFcrypto/hpke: new package #75300func MLKEM1024() KEMcrypto/hpke: new package #75300func MLKEM1024P384() KEMcrypto/hpke: new package #75300func MLKEM768() KEMcrypto/hpke: new package #75300func MLKEM768P256() KEMcrypto/hpke: new package #75300func MLKEM768X25519() KEMcrypto/hpke: new package #75300func NewAEAD(uint16) (AEAD, error)crypto/hpke: new package #75300func NewDHKEMPrivateKey(ecdh.KeyExchanger) (PrivateKey, error)crypto/hpke: new package #75300func NewDHKEMPublicKey(*ecdh.PublicKey) (PublicKey, error)crypto/hpke: new package #75300func NewHybridPrivateKey(crypto.Decapsulator, ecdh.KeyExchanger) (PrivateKey, error)crypto/hpke: new package #75300func NewHybridPublicKey(crypto.Encapsulator, *ecdh.PublicKey) (PublicKey, error)crypto/hpke: new package #75300func NewKDF(uint16) (KDF, error)crypto/hpke: new package #75300func NewKEM(uint16) (KEM, error)crypto/hpke: new package #75300func NewMLKEMPrivateKey(crypto.Decapsulator) (PrivateKey, error)crypto/hpke: new package #75300func NewMLKEMPublicKey(crypto.Encapsulator) (PublicKey, error)crypto/hpke: new package #75300func NewRecipient([]uint8, PrivateKey, KDF, AEAD, []uint8) (*Recipient, error)crypto/hpke: new package #75300func NewSender(PublicKey, KDF, AEAD, []uint8) ([]uint8, *Sender, error)crypto/hpke: new package #75300func Open(PrivateKey, KDF, AEAD, []uint8, []uint8) ([]uint8, error)crypto/hpke: new package #75300func SHAKE128() KDFcrypto/hpke: new package #75300func SHAKE256() KDFcrypto/hpke: new package #75300func Seal(PublicKey, KDF, AEAD, []uint8, []uint8) ([]uint8, error)crypto/hpke: new package #75300method (*Recipient) Export(string, int) ([]uint8, error)crypto/hpke: new package #75300method (*Recipient) Open([]uint8, []uint8) ([]uint8, error)crypto/hpke: new package #75300method (*Sender) Export(string, int) ([]uint8, error)crypto/hpke: new package #75300method (*Sender) Seal([]uint8, []uint8) ([]uint8, error)crypto/hpke: new package #75300type AEAD interface, ID() uint16crypto/hpke: new package #75300type AEAD interface, unexported methodscrypto/hpke: new package #75300type KDF interface, ID() uint16crypto/hpke: new package #75300type KDF interface, unexported methodscrypto/hpke: new package #75300type KEM interface, DeriveKeyPair([]uint8) (PrivateKey, error)crypto/hpke: new package #75300type KEM interface, GenerateKey() (PrivateKey, error)crypto/hpke: new package #75300type KEM interface, ID() uint16crypto/hpke: new package #75300type KEM interface, NewPrivateKey([]uint8) (PrivateKey, error)crypto/hpke: new package #75300type KEM interface, NewPublicKey([]uint8) (PublicKey, error)crypto/hpke: new package #75300type KEM interface, unexported methodscrypto/hpke: new package #75300type PrivateKey interface, Bytes() ([]uint8, error)crypto/hpke: new package #75300type PrivateKey interface, KEM() KEMcrypto/hpke: new package #75300type PrivateKey interface, PublicKey() PublicKeycrypto/hpke: new package #75300type PrivateKey interface, unexported methodscrypto/hpke: new package #75300type PublicKey interface, Bytes() []uint8crypto/hpke: new package #75300type PublicKey interface, KEM() KEMcrypto/hpke: new package #75300type PublicKey interface, unexported methodscrypto/hpke: new package #75300type Recipient structcrypto/hpke: new package #75300type Sender structcrypto/hpke: new package #75300
crypto/mlkem
method (*DecapsulationKey1024) Encapsulator() crypto.Encapsulatorcrypto/hpke: new package #75300method (*DecapsulationKey768) Encapsulator() crypto.Encapsulatorcrypto/hpke: new package #75300
crypto/mlkem/mlkemtest
func Encapsulate1024(*mlkem.EncapsulationKey1024, []uint8) ([]uint8, []uint8, error)crypto/mlkem: support derandomized encapsulation in tests #73627func Encapsulate768(*mlkem.EncapsulationKey768, []uint8) ([]uint8, []uint8, error)crypto/mlkem: support derandomized encapsulation in tests #73627
crypto/rsa
func DecryptPKCS1v15 //deprecatedcrypto/rsa: deprecate PKCS #1 v1.5 encryption #75302func DecryptPKCS1v15SessionKey //deprecatedcrypto/rsa: deprecate PKCS #1 v1.5 encryption #75302func EncryptOAEPWithOptions(io.Reader, *PublicKey, []uint8, *OAEPOptions) ([]uint8, error)crypto/rsa: allow hash.Hash for OAEP and MGF1 to be specified independently for encryption #65716func EncryptPKCS1v15 //deprecatedcrypto/rsa: deprecate PKCS #1 v1.5 encryption #75302type PKCS1v15DecryptOptions //deprecatedcrypto/rsa: deprecate PKCS #1 v1.5 encryption #75302
crypto/tls
const QUICErrorEvent = 10crypto/tls: add QUICEvent.Err #75108const QUICErrorEvent QUICEventKindcrypto/tls: add QUICEvent.Err #75108const SecP256r1MLKEM768 = 4587crypto/tls: add support for NIST curve based ML-KEM hybrids #71206const SecP256r1MLKEM768 CurveIDcrypto/tls: add support for NIST curve based ML-KEM hybrids #71206const SecP384r1MLKEM1024 = 4589crypto/tls: add support for NIST curve based ML-KEM hybrids #71206const SecP384r1MLKEM1024 CurveIDcrypto/tls: add support for NIST curve based ML-KEM hybrids #71206type ClientHelloInfo struct, HelloRetryRequest boolcrypto/tls: exposetestingOnlyDidHRRfrom ConnectionState #74425type ConnectionState struct, HelloRetryRequest boolcrypto/tls: exposetestingOnlyDidHRRfrom ConnectionState #74425type QUICEvent struct, Err errorcrypto/tls: add QUICEvent.Err #75108
crypto/x509
func OIDFromASN1OID(asn1.ObjectIdentifier) (OID, error)crypto/x509: add ExtKeyUsage.OID #75325method (ExtKeyUsage) OID() OIDcrypto/x509: add ExtKeyUsage.OID #75325method (ExtKeyUsage) String() stringcrypto/x509: add String() for KeyUsage, ExtKeyUsage #56866method (KeyUsage) String() stringcrypto/x509: add String() for KeyUsage, ExtKeyUsage #56866
database/sql/driver
type RowsColumnScanner interface { Close, Columns, Next, ScanColumn }database/sql/driver: allow driver to entirely override Scan #67546type RowsColumnScanner interface, Close() errordatabase/sql/driver: allow driver to entirely override Scan #67546type RowsColumnScanner interface, Columns() []stringdatabase/sql/driver: allow driver to entirely override Scan #67546type RowsColumnScanner interface, Next([]Value) errordatabase/sql/driver: allow driver to entirely override Scan #67546type RowsColumnScanner interface, ScanColumn(interface{}, int) errordatabase/sql/driver: allow driver to entirely override Scan #67546
debug/elf
const R_LARCH_CALL36 = 110cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_CALL36 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC32 = 13cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC32 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64 = 14cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_HI12 = 118cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_HI12 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_LO20 = 117cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_LO20 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_PC_HI12 = 114cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_PC_HI12 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_PC_LO20 = 113cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC64_PC_LO20 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_CALL = 120cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_CALL R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_HI20 = 115cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_HI20 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_LD = 119cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_LD R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_LO12 = 116cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_LO12 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_PCREL20_S2 = 126cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_PCREL20_S2 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_PC_HI20 = 111cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_PC_HI20 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_PC_LO12 = 112cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_DESC_PC_LO12 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_GD_PCREL20_S2 = 125cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_GD_PCREL20_S2 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LD_PCREL20_S2 = 124cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LD_PCREL20_S2 R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LE_ADD_R = 122cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LE_ADD_R R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LE_HI20_R = 121cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LE_HI20_R R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LE_LO12_R = 123cmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562const R_LARCH_TLS_LE_LO12_R R_LARCHcmd/link: unknown relocation type 110 (R_LARCH_CALL36) on loong64 with internal linking libgcc.a #75562
errors
func AsType[$0 error](error) ($0, bool)errors: AsType (As with type parameters) #51945
go/ast
func ParseDirective(token.Pos, string) (Directive, bool)go/ast: add ParseDirective #68021method (*Directive) End() token.Posgo/ast: add ParseDirective #68021method (*Directive) ParseArgs() ([]DirectiveArg, error)go/ast: add ParseDirective #68021method (*Directive) Pos() token.Posgo/ast: add ParseDirective #68021type BasicLit struct, ValueEnd token.Posgo/ast: add BasicLit.ValueEnd field #76031type Directive structgo/ast: add ParseDirective #68021type Directive struct, Args stringgo/ast: add ParseDirective #68021type Directive struct, ArgsPos token.Posgo/ast: add ParseDirective #68021type Directive struct, Name stringgo/ast: add ParseDirective #68021type Directive struct, Slash token.Posgo/ast: add ParseDirective #68021type Directive struct, Tool stringgo/ast: add ParseDirective #68021type DirectiveArg structgo/ast: add ParseDirective #68021type DirectiveArg struct, Arg stringgo/ast: add ParseDirective #68021type DirectiveArg struct, Pos token.Posgo/ast: add ParseDirective #68021
go/token
method (*File) End() Posgo/token: add File.End method #75849
log/slog
func NewMultiHandler(...Handler) *MultiHandlerlog/slog: add multiple handlers support for logger #65954method (*MultiHandler) Enabled(context.Context, Level) boollog/slog: add multiple handlers support for logger #65954method (*MultiHandler) Handle(context.Context, Record) errorlog/slog: add multiple handlers support for logger #65954method (*MultiHandler) WithAttrs([]Attr) Handlerlog/slog: add multiple handlers support for logger #65954method (*MultiHandler) WithGroup(string) Handlerlog/slog: add multiple handlers support for logger #65954type MultiHandler structlog/slog: add multiple handlers support for logger #65954
net
method (*Dialer) DialIP(context.Context, string, netip.Addr, netip.Addr) (*IPConn, error)net: add context-aware Dialer methods DialTCP, DialUDP, DialIP, DialUnix #49097method (*Dialer) DialTCP(context.Context, string, netip.AddrPort, netip.AddrPort) (*TCPConn, error)net: add context-aware Dialer methods DialTCP, DialUDP, DialIP, DialUnix #49097method (*Dialer) DialUDP(context.Context, string, netip.AddrPort, netip.AddrPort) (*UDPConn, error)net: add context-aware Dialer methods DialTCP, DialUDP, DialIP, DialUnix #49097method (*Dialer) DialUnix(context.Context, string, *UnixAddr, *UnixAddr) (*UnixConn, error)net: add context-aware Dialer methods DialTCP, DialUDP, DialIP, DialUnix #49097
net/http
method (*ClientConn) Available() intnet/http: client connection API #75772method (*ClientConn) Close() errornet/http: client connection API #75772method (*ClientConn) Err() errornet/http: client connection API #75772method (*ClientConn) InFlight() intnet/http: client connection API #75772method (*ClientConn) Release()net/http: client connection API #75772method (*ClientConn) Reserve() errornet/http: client connection API #75772method (*ClientConn) RoundTrip(*Request) (*Response, error)net/http: client connection API #75772method (*ClientConn) SetStateHook(func(*ClientConn))net/http: client connection API #75772method (*Transport) NewClientConn(context.Context, string, string) (*ClientConn, error)net/http: client connection API #75772type ClientConn structnet/http: client connection API #75772type HTTP2Config struct, StrictMaxConcurrentRequests boolnet/http: HTTP/2 configuration API #67813
net/http/httputil
type ReverseProxy struct, Director //deprecatednet/http/httputil: deprecate ReverseProxy.Director #73161
net/netip
method (Prefix) Compare(Prefix) intnet/netip: add Prefix.Compare and AddrPort.Compare #61642
os
method (*Process) WithHandle(func(uintptr)) erroros: add (*Process).WithHandle #70352var ErrNoHandle erroros: add (*Process).WithHandle #70352
reflect
method (Value) Fields() iter.Seq2[StructField, Value]reflect: Add Type.Fields() iter.Seq[StructField] and Type.Methods() iter.Seq[Method] #66631method (Value) Methods() iter.Seq2[Method, Value]reflect: Add Type.Fields() iter.Seq[StructField] and Type.Methods() iter.Seq[Method] #66631type Type interface, Fields() iter.Seq[StructField]reflect: Add Type.Fields() iter.Seq[StructField] and Type.Methods() iter.Seq[Method] #66631type Type interface, Ins() iter.Seq[Type]reflect: Add Type.Fields() iter.Seq[StructField] and Type.Methods() iter.Seq[Method] #66631type Type interface, Methods() iter.Seq[Method]reflect: Add Type.Fields() iter.Seq[StructField] and Type.Methods() iter.Seq[Method] #66631type Type interface, Outs() iter.Seq[Type]reflect: Add Type.Fields() iter.Seq[StructField] and Type.Methods() iter.Seq[Method] #66631
testing
method (*B) ArtifactDir() stringtesting: store test artifacts #71287method (*F) ArtifactDir() stringtesting: store test artifacts #71287method (*T) ArtifactDir() stringtesting: store test artifacts #71287type TB interface, ArtifactDir() stringtesting: store test artifacts #71287
testing/cryptotest
func SetGlobalRandom(*testing.T, uint64)crypto: ignore rand io.Reader where behavior is not specified #70942
CC @aclements, @ianlancetaylor, @golang/release.
Metadata
Metadata
Assignees
Labels
ExpertNeededNeedsDecisionFeedback is required from experts, contributors, and/or the community before a change can be made.Feedback is required from experts, contributors, and/or the community before a change can be made.release-blocker