summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* src: lint lib/net.jsv0.10.25v0.10.25-releaseTimothy J Fontaine2014-01-221-20/+21
|
* 2014.01.23, Version 0.10.25 (Stable)Timothy J Fontaine2014-01-223-2/+27
| | | | | | | | | | | | | | | | | | * uv: Upgrade to v0.10.23 * npm: Upgrade to v1.3.24 * v8: Fix enumeration for objects with lots of properties * child_process: fix spawn() optional arguments (Sam Roberts) * cluster: report more errors to workers (Fedor Indutny) * domains: exit() only affects active domains (Ryan Graham) * src: OnFatalError handler must abort() (Timothy J Fontaine) * stream: writes may return false but forget to emit drain (Yang Tianyang)
* uv: Upgrade to v0.10.23Timothy J Fontaine2014-01-228-22/+148
|
* gyp: fix non-ninja buildFedor Indutny2014-01-201-1/+1
|
* npm: Upgrade to v1.3.24isaacs2014-01-19183-5712/+1190
|
* blog: nodejs v0.12 roadmap updateTimothy J Fontaine2014-01-161-0/+52
|
* gyp: fix `ninja` build on linuxFedor Indutny2014-01-162-6/+13
| | | | fix #6679
* doc: clarify Windows signal sending emulationSam Roberts2014-01-161-4/+10
|
* child_process: fix spawn() optional argumentsSam Roberts2014-01-161-2/+10
| | | | | | | Spawn's arguments were documented to be optional, as they are for the other similar child_process APIs, but the code was missing. Result was `child_process.spawn('node', {})` errored when calling slice() on an Object, now it behaves as the documentation said it would.
* doc: describe child_process.fork() silent optionSam Roberts2014-01-161-2/+4
|
* doc: child_process.execFile arguments are optionalSam Roberts2014-01-161-1/+1
|
* domains: exit() only affects active domainsRyan Graham2014-01-152-5/+41
| | | | | | | domain.create().exit() should not clear the domain stack if the domain instance does not exist within the stack. Signed-off-by: Trevor Norris <trev.norris@gmail.com>
* blog: TJ is the new node core project leadisaacs2014-01-151-0/+54
|
* gyp: fix build with python 2.6Fedor Indutny2014-01-131-1/+2
| | | | fix #6859
* deps: update gyp to 1eae492bFedor Indutny2014-01-138-56/+113
|
* doc: streams must be open to be passed to childSam Roberts2014-01-131-1/+3
| | | | | | | | | | | | | | spawn stdio options can be a 'stream', but the following code fails with "Incorrect value for stdio stream: [object Object]", despite being a stream. The problem is the test isn't really for a stream, its for an object with a numeric `.fd` property, and streams do not have an fd until their async 'open' event has occurred. This is reasonable, but was not documented. child_process.spawn('date', [], {stdio: [ 'ignore', fs.createWriteStream('out.txt',{flags:'a'}), 'ignore']})
* test: close debug client in test-debugger-clientAlexis Campailla2014-01-131-3/+8
| | | | | Killing the debuggee without first closing the socket can result in an ECONNRESET error.
* src: return empty set on ENOSYS for interfacesTimothy J Fontaine2014-01-121-2/+5
| | | | | | | If node was compiled with --no-ifaddrs to support older operating systems, don't throw instead simply return an empty object Fixes #6846
* v8: backport codereview.chromium.org/11362182svenpanne@chromium.org2014-01-101-1/+3
| | | | | | | Keep the number of descriptors below DescriptorArray::kMaxNumberOfDescriptors even for accessors Review URL: https://codereview.chromium.org/11362182
* doc: Fix argument typo in SimpleProtocol examplegluxon2014-01-101-1/+1
|
* src: OnFatalError handler must abort()Timothy J Fontaine2014-01-092-1/+40
| | | | | | | We are in an unrecoverable state if v8 throws a FatalError, actually ask the operating system to dump core in this case. Fixes #6836
* doc: fix typo in cluster pageLorenz Leutgeb2014-01-081-1/+1
|
* uv: Upgrade to v0.10.22Timothy J Fontaine2014-01-0711-6/+115
|
* npm: Upgrade to 1.3.23isaacs2014-01-06215-432/+618
|
* stream: writes may return false but forget to emit drainayanamist2014-01-052-1/+76
| | | | | | | | | | | | | | If a write is above the highWaterMark, _write still manages to fully send it synchronously, _writableState.length will be adjusted down to 0 synchronously with the write returning false, but 'drain' will not be emitted until process.nextTick. If another small write which is below highWaterMark is issued before process.nextTick happens, _writableState.needDrain will be reset to false, and the drain event will never be fired. So we should check needDrain before setting it up, which prevents it from inproperly resetting to false.
* blog: Post for v0.11.10Timothy J Fontaine2013-12-311-0/+106
|
* doc: document that `process.send` is synchronousMaciej MaƂecki2013-12-311-0/+5
| | | | Ref #2598
* doc: clarify process on exit safe usageTimothy J Fontaine2013-12-311-5/+7
|
* docs: process.on('exit') receives exit codeRon Korving2013-12-311-3/+4
| | | | | | The fact that the "exit" event passes the exit code as an argument as omitted from the documentation. This adds the explanation and augments the example code to show that.
* test: fix test-cluster-eaccess to work on windowsTimothy J Fontaine2013-12-311-16/+19
|
* cluster: report more errors to workersFedor Indutny2013-12-314-9/+83
| | | | | | | Some errors for listening and binding to a socket were not properly delivered to workers. fix #6767
* deps: update gyp to 828ce09Fedor Indutny2013-12-3012-134/+559
|
* doc: Fix missing backtick in debugger docDav Glass2013-12-301-1/+1
|
* build: add settings for VS 2013 to vcbuild.batLev Gimelfarb2013-12-281-0/+9
| | | | | Search for VS2013 compiler 1st, before falling back to older ones. This allows compiling using the latest VS2013.
* npm: Upgrade to v1.3.22isaacs2013-12-25124-168/+277
|
* build: install common.gypi along with headersT.C. Hollingsworth2013-12-201-0/+1
| | | | node-gyp requires this file
* blog: Post for v0.10.24Timothy J Fontaine2013-12-191-0/+68
|
* Now working on 0.10.25Timothy J Fontaine2013-12-191-2/+2
|
* Merge branch 'v0.10.24-release' into v0.10Timothy J Fontaine2013-12-192-2/+17
|\
| * 2013.12.18, Version 0.10.24 (Stable)v0.10.24v0.10.24-releaseTimothy J Fontaine2013-12-182-2/+17
|/ | | | | | | | | | | | | | * uv: Upgrade to v0.10.21 * npm: upgrade to 1.3.21 * v8: backport fix for CVE-2013-{6639|6640} * build: unix install node and dep library headers (Timothy J Fontaine) * cluster, v8: fix --logfile=%p.log (Ben Noordhuis) * module: only cache package main (Wyatt Preul)
* uv: Upgrade to v0.10.21Timothy J Fontaine2013-12-184-4/+15
|
* cluster, v8: fix --logfile=%p.logBen Noordhuis2013-12-181-0/+4
| | | | | | | | | The %p is replaced with the current PID. This used to work in node.js v0.9.7 but it seems to have been lost somewhere along the way. This commit makes the fix from 6b713b52 ("cluster: make --prof work for workers") work again. Without it, all log data ends up in a single file and is unusable because the addresses are all wrong.
* build: unix install node and dep library headersTimothy J Fontaine2013-12-181-0/+36
| | | | | Restores functionality from v0.8 where module authors may not be relying on gyp for building their modules.
* npm: upgrade to 1.3.21isaacs2013-12-17111-115/+119
|
* npm: upgrade to 1.3.20isaacs2013-12-17110-116/+118
| | | | | | | | | The 1.3.19 release had a critical bug: any packages published with it could not be installed, because the shasum would be incorrect. Thankfully, 1.3.19 was published using 1.3.19, so could not be installed by any users! However, if it goes out as part of a Node.js release, then obviously that would be a problem.
* npm: Upgrade to 1.3.19isaacs2013-12-16172-742/+1235
|
* v8: backport fix for CVE-2013-{6639|6640}jkummerow@chromium.org2013-12-148-34/+140
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Quoting CVE-2013-6639: The DehoistArrayIndex function in hydrogen-dehoist.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index. Quoting CVE-2013-6640: The DehoistArrayIndex function in hydrogen-dehoist.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index. Like 6b92a7, this is unlikely to affect node.js because it only runs local, trusted code. However, if there exists some module somewhere that populates an array index with remotely provided data this could very well be used to crash a remote server running node. Defense in depth and all. This is a backport of upstream commit r17801. Original commit log: Limit size of dehoistable array indices LOG=Y BUG=chromium:319835,chromium:319860 R=dslomov@chromium.org Review URL: https://codereview.chromium.org/74113002
* module: only cache package mainWyatt Preul2013-12-121-6/+6
|
* blog: Post for v0.10.23Timothy J Fontaine2013-12-111-0/+86
|
* Now working on 0.10.24Timothy J Fontaine2013-12-111-2/+2
|