Skip to content


Subversion checkout URL

You can clone with
Download ZIP
branch: v0.10.4-release
Commits on Apr 11, 2013
  1. @isaacs

    2013.04.11, Version 0.10.4 (Stable)

    isaacs authored
    * uv: Upgrade to 0.10.4
    * npm: Upgrade to 1.2.18
    * v8: Avoid excessive memory growth in JSON.parse (Fedor Indutny)
    * child_process, cluster: fix O(n*m) scan of cmd string (Ben Noordhuis)
    * net: fix socket.bytesWritten Buffers support (Fedor Indutny)
    * buffer: fix offset checks (Łukasz Walukiewicz)
    * stream: call write cb before finish event (isaacs)
    * http: Support write(data, 'hex') (isaacs)
    * crypto: dh secret should be left-padded (Fedor Indutny)
    * process: expose NODE_MODULE_VERSION in process.versions (Rod Vagg)
    * crypto: fix constructor call in crypto streams (Andreas Madsen)
    * net: account for encoding in .byteLength (Fedor Indutny)
    * net: fix buffer iteration in bytesWritten (Fedor Indutny)
    * crypto: zero is not an error if writing 0 bytes (Fedor Indutny)
    * tls: Re-enable check of CN-ID in cert verification (Tobias Müllerleile)
  2. @isaacs

    npm: Upgrade to 1.2.18

    isaacs authored
  3. @isaacs

    uv: Upgrade to v0.10.4

    isaacs authored
  4. @bnoordhuis

    child_process: fix O(n*m) scan of cmd string

    bnoordhuis authored
    Don't scan the whole string for a "NODE_" substring, just check that
    the string starts with the expected prefix.
    This is a reprise of dbbfbe7 but this time for the child_process
  5. @bnoordhuis

    cluster: fix O(n*m) scan of cmd string

    bnoordhuis authored
    Don't scan the whole string for a "NODE_CLUSTER_" substring, just check
    that the string starts with the expected prefix. The linear scan was
    causing a noticeable (but unsurprising) slowdown on messages with a
    large .cmd string property.
Commits on Apr 10, 2013
  1. @bnoordhuis

    src: don't SetInternalField() in ObjectWrap dtor

    bnoordhuis authored
    Call SetPointerInInternalField(0, NULL) rather than
    SetInternalField(0, Undefined()).
    Fixes the following spurious NULL pointer dereference in debug builds:
      #0  0x03ad2821 in v8::internal::FixedArrayBase::length ()
      #1  0x03ad1dfc in v8::internal::FixedArray::get ()
      #2  0x03ae05dd in v8::internal::Context::global_object ()
      #3  0x03b6b87d in v8::internal::Context::builtins ()
      #4  0x03ae1871 in v8::internal::Isolate::js_builtins_object ()
      #5  0x03ab4fab in v8::CallV8HeapFunction ()
      #6  0x03ab4d4a in v8::Value::Equals ()
      #7  0x03b4f38b in CheckEqualsHelper ()
      #8  0x03ac0f4b in v8::Object::SetInternalField ()
      #9  0x06a99ddd in node::ObjectWrap::~ObjectWrap ()
      #10 0x06a8b051 in node::Buffer::~Buffer ()
      #11 0x06a8afbb in node::Buffer::~Buffer ()
      #12 0x06a8af5e in node::Buffer::~Buffer ()
      #13 0x06a9e569 in node::ObjectWrap::WeakCallback ()
  2. @bnoordhuis

    Revert "crypto: use better memory BIO implementation"

    bnoordhuis authored
    This change shouldn't have landed in the stable branch. It's a feature,
    not a bug fix.
    This reverts commit 58f93ff.
    This reverts commit 8c8ebe4.
    This reverts commit ba0f7b8.
    This reverts commit 21f3c5c.
  3. @indutny

    net: fix socket.bytesWritten Buffers support

    indutny authored
    Buffer.byteLength() works only for string inputs. Thus, when connection
    has pending Buffer to write, it should just use it's length instead of
    throwing exception.
Commits on Apr 9, 2013
  1. @bnoordhuis
  2. @isaacs

    blog: Post for v0.8.23

    isaacs authored
Commits on Apr 8, 2013
  1. @morkai @isaacs

    buffer: fix offset checks

    morkai authored isaacs committed
    Fixed offset checks in Buffer.readInt32LE() and Buffer.readInt32BE()
  2. @isaacs @indutny

    stream: call write cb before finish event

    isaacs authored indutny committed
    Since 049903e, an end callback could be called before a write
    callback if end() is called before the write is done. This patch
    resolves the issue.
    In collaboration with @gne
    Fixes felixge/node-formidable#209
    Fixes #5215
  3. @isaacs

    http: Support write(data, 'hex')

    isaacs authored
    We were assuming that any string can be concatenated safely to
    CRLF.  However, for hex, base64, or binary encoded writes, this
    is not the case, and results in sending the incorrect response.
    An unusual edge case, but certainly a bug.
  4. @indutny

    crypto: dh secret should be left-padded

    indutny authored
    DH_compute_secret() may return key that is smaller than input buffer,
    in such cases key should be left-padded because it is a BN (big number).
    fix #5239
  5. @rvagg @bnoordhuis

    process: expose NODE_MODULE_VERSION in process.versions

    rvagg authored bnoordhuis committed
  6. @indutny
  7. @indutny

    crypto: fix changing buffers in bio

    indutny authored
    We should go to next buffer if *current* one is full, not the next one.
    Otherwise we may hop through buffers and written data will become
    interleaved, which will lead to failure.
  8. @indutny

    crypto: fix style issues in bio

    indutny authored
    Stop changing arguments, use local variables for things that change.
  9. @AndreasMadsen @indutny

    crypto: fix constructor call in crypto streams

    AndreasMadsen authored indutny committed
    When using some stream method on a lazy crypto stream, the transform
    constructor wasn't called. This caused the internal state object to
    be undefined.
  10. @indutny
Commits on Apr 7, 2013
  1. @bnoordhuis

    doc: document linux pwrite() bug

    bnoordhuis authored
    On Linux, positional writes don't work when the file is opened in
    append mode. The kernel ignores the position argument and always
    appends the data to the end of the file.
    To quote the man page:
      POSIX requires that opening a file with the O_APPEND flag should have
      no affect on the location at which pwrite() writes data.  However, on
      Linux, if a file is opened with O_APPEND, pwrite() appends data to the
      end of the file, regardless of the value of offset.
  2. @indutny
  3. @indutny
  4. @tmuellerleile @indutny

    tls: Re-enable check of CN-ID in cert verification

    tmuellerleile authored indutny committed
    RFC 6125 explicitly states that a client "MUST NOT seek a match
    for a reference identifier of CN-ID if the presented identifiers
    include a DNS-ID, SRV-ID, URI-ID, or any application-specific
    identifier types supported by the client", but it MAY do so if
    none of the mentioned identifier types (but others) are present.
Commits on Apr 5, 2013
  1. @rgarcia @isaacs

    stream: unused variable

    rgarcia authored isaacs committed
  2. @rgarcia @isaacs

    stream: remove vestiges of previous _transform API

    rgarcia authored isaacs committed
  3. @isaacs
  4. @indutny
Commits on Apr 3, 2013
  1. @isaacs

    blog: Post about 0.10.3

    isaacs authored
  2. @isaacs

    Now working on 0.10.4

    isaacs authored
  3. @isaacs
  4. @indutny

    v8: cherry-pick 75311294 from upstream

    indutny authored
    Quote from commit message:
        Create a new HandleScope for each JSON-parsed object to avoid
        excessive growth.
  5. @isaacs

    2013.04.03, Version 0.10.3 (Stable)

    isaacs authored
    * npm: Upgrade to 1.2.17
    * child_process: acknowledge sent handles (Fedor Indutny)
    * etw: update prototypes to match dtrace provider (Timothy J Fontaine)
    * dtrace: pass more arguments to probes (Dave Pacheco)
    * build: allow building with dtrace on osx (Dave Pacheco)
    * http: Remove legacy ECONNRESET workaround code (isaacs)
    * http: Ensure socket cleanup on client response end (isaacs)
    * tls: Destroy socket when encrypted side closes (isaacs)
    * repl: isSyntaxError() catches "strict mode" errors (Nathan Rajlich)
    * crypto: Pass options to ctor calls (isaacs)
    * src: tie process.versions.uv to uv_version_string() (Ben Noordhuis)
  6. @isaacs
  7. @isaacs

    npm: Upgrade to 1.2.17

    isaacs authored
Something went wrong with that request. Please try again.