Skip to main content

How to Install Go on CentOS 7

Go, often referred to as golang is a modern open source programming language created by Google. Many popular applications, including Kubernetes, Docker, Hugo and Caddy, are written in Go.
In this tutorial we will show you how to download and install Go on a CentOS 7 system.
Before continuing with this tutorial, make sure you are logged in as a user with sudo privileges.
At the time of writing this article, the latest stable version of Go is version 1.10.3. Before downloading the tarball visit the official Go downloads page and check if there is a new version available.
Follow the steps below to install Go on CentOS 7:
  1. Download the tarball.
    To download the Go binary use either wget or curl:
    wget https://dl.google.com/go/go1.10.3.linux-amd64.tar.gz
    Copy
  2. Verify the tarball.
    Once the download is completed verify the tarball checksum with the sha256sum command:
    sha256sum go1.10.3.linux-amd64.tar.gz
    Copy
    fa1b0e45d3b647c252f51f5e1204aba049cde4af177ef9f2181f43004f901035  go1.10.3.linux-amd64.tar.gz
    Copy
    Make sure the hash printed from the command above matches the one from the downloads page.
  3. Extract the tarball.
    Use the tar command to extract the tarball to the /usr/local directory:
    sudo tar -C /usr/local -xzf go1.10.3.linux-amd64.tar.gz
    Copy
  4. Adjust the Path Variable.
    Now we need to tell our system where to find the Go executable binaries by adjusting the PATH environment variable.
    We can do this by appending the following line to the /etc/profile file (for a system-wide installation) or to the $HOME/.bash_profile file (for a current user installation):
    ~/.bash_profile
    export PATH=$PATH:/usr/local/go/bin
    Copy
    Save the file, and load the new PATH environment variable into the current shell session with the following command:
    source ~/.bash_profile
    Copy
To test whether Go is installed correctly we will set up a workspace and build a simple “Hello world” program.
  1. Create the workspace directory
    By default the workspace directory is set to $HOME/go, to create it type:
    mkdir ~/go
    Copy
  2. Create a simple “Hello World” Go file.
    Inside the workspace create a new directory src/hello
    mkdir -p ~/go/src/hello
    Copy
    and in that directory create a file named hello.go
    ~/go/src/hello/hello.go
    package main
    
    import "fmt"
    
    func main() {
        fmt.Printf("Hello, World\n")
    }
    Copy
    You can learn more about Go workspace directory hierarchy here
  3. Build the hello.go file:
    To build the file switch to the ~/go/src/hello directory and run go build:
    cd ~/go/src/hellogo build
    Copy
    The command above will build an executable named hello.
  4. Run the executable:
    Run the executable by typing:
    ./hello
    Copy
    Hello, World
    Copy
    If you see the output above, then you have successfully installed Go.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...