summaryrefslogtreecommitdiff
path: root/deps
AgeCommit message (Collapse)Author
2013-05-31Merge remote-tracking branch 'ry/v0.10'isaacs
Conflicts: ChangeLog src/node_version.h
2013-05-30npm: Upgrade to 1.2.24isaacs
2013-05-30uv: upgrade to v0.11.4Bert Belder
2013-05-28uv: Upgrade to v0.10.9isaacs
2013-05-27Merge remote-tracking branch 'ry/v0.10'isaacs
Conflicts: AUTHORS ChangeLog configure deps/uv/ChangeLog deps/uv/src/unix/darwin.c deps/uv/src/unix/stream.c deps/uv/src/version.c deps/v8/src/isolate.cc deps/v8/src/version.cc lib/http.js src/node_version.h
2013-05-24npm: Upgrade to 1.2.23isaacs
2013-05-24uv: upgrade to 0.10.8isaacs
2013-05-23v8: re-apply floating patchesTimothy J Fontaine
2013-05-23v8: fix GetLocalizedMessage usageTimothy J Fontaine
As is the backport of the abort on uncaught exception wouldn't compile because we it was passing in `this` when it was unnecessary.
2013-05-23v8: update to 3.14.5.9Timothy J Fontaine
2013-05-22v8: reapply floating patchesBen Noordhuis
2013-05-22v8: upgrade to v3.19.3Trevor Norris
2013-05-15deps: fix up header files in cares.gypBen Noordhuis
Please msbuild, update the header list.
2013-05-15deps: reapply c-ares floating patchBen Noordhuis
2013-05-14uv: upgrade to v0.11.3Bert Belder
2013-05-14uv: upgrade to v0.10.7Bert Belder
2013-05-14uv: Upgrade to 0.10.6isaacs
2013-05-14npm: Upgrade to 1.2.21isaacs
2013-05-14deps: upgrade c-ares to 1.10.0Ben Noordhuis
2013-05-13npm: Upgrade to 1.2.21isaacs
2013-05-13v8: reapply floating patchesBen Noordhuis
2013-05-13deps: upgrade v8 to 3.19.0Ben Noordhuis
2013-05-10npm: Upgrade to 1.2.20isaacs
2013-05-10uv: Upgrade to 0.11.2isaacs
2013-05-01Revert "deps: downgrade openssl to v1.0.0f"Ben Noordhuis
After much investigation it turns out that the affected servers are buggy. user-service.condenastdigital.com:443 in particular seems to reject large TLS handshake records. Cutting down the number of advertised ciphers or disabling SNI fixes the issue. Similarly, passing { secureOptions: constants.SSL_OP_NO_TLSv1_2 } seems to fix most connection issues with IIS servers. Having to work around buggy servers is annoying for our users but not a reason to downgrade OpenSSL. Therefore, revert it. This reverts commit 4fdb8acdaef4c3cb1d855e992ada0e63fee520a6.
2013-04-29v8: reapply floating patchesBen Noordhuis
2013-04-29deps: upgrade v8 to 3.18.4Ben Noordhuis
2013-04-29Revert "deps: downgrade openssl to v1.0.0f"Ben Noordhuis
This commit undoes the downgrade from OpenSSL v1.0.1e to v1.0.0f, effectively upgrading OpenSSL to v1.0.1e again. The reason for the downgrade was to work around compatibility issues with certain TLS servers in the stable branch. See the commit log of 4fdb8ac and the linked issue for details. We're going to revisit that in the master branch. This reverts commit 4fdb8acdaef4c3cb1d855e992ada0e63fee520a6.
2013-04-29Merge remote-tracking branch 'origin/v0.10'Ben Noordhuis
Conflicts: AUTHORS ChangeLog deps/uv/ChangeLog deps/uv/src/version.c lib/http.js src/node_crypto.cc src/node_os.cc src/node_version.h test/simple/helper-debugger-repl.js
2013-04-29deps: downgrade openssl to v1.0.0fBen Noordhuis
Several people have reported issues with IIS and Resin servers (or maybe SSL terminators sitting in front of those servers) that are fixed by downgrading OpenSSL. The AESNI performance improvements were nice but stability is more important. Downgrade OpenSSL from 1.0.1e to 1.0.0f. Fixes #5360 (and others).
2013-04-22uv: Upgrade to 0.10.5isaacs
2013-04-19v8: reapply floating patchesBen Noordhuis
2013-04-19V8: Upgrade to 3.18.1isaacs
2013-04-17v8: reapply floating patchesBen Noordhuis
2013-04-17deps: upgrade v8 to 3.18.0Ben Noordhuis
2013-04-12uv: Upgrade to v0.11.1Fedor Indutny
2013-04-12Merge branch 'v0.10'Fedor Indutny
Conflicts: ChangeLog deps/uv/src/version.c src/node.h src/node_crypto.cc src/node_crypto_bio.cc src/node_crypto_bio.h src/node_object_wrap.h src/node_version.h
2013-04-11npm: Upgrade to 1.2.18isaacs
2013-04-11uv: Upgrade to v0.10.4isaacs
2013-04-08v8: reapply floating patchesBen Noordhuis
2013-04-08v8: upgrade to 3.17.16Ben Noordhuis
2013-04-05Merge remote-tracking branch 'ry/v0.10'isaacs
Conflicts: AUTHORS ChangeLog deps/v8/src/json-parser.h lib/crypto.js src/node_version.h
2013-04-03v8: cherry-pick 75311294 from upstreamFedor Indutny
Quote from commit message: Create a new HandleScope for each JSON-parsed object to avoid excessive growth.
2013-04-03npm: Upgrade to 1.2.17isaacs
2013-03-29deps: upgrade libuv to c43e851Ben Noordhuis
2013-03-28Merge remote-tracking branch 'ry/v0.10'isaacs
Conflicts: src/node.cc src/node_version.h
2013-03-28deps: upgrade libuv to v0.10.3Bert Belder
2013-03-28npm: Upgrade to v1.2.15isaacs
2013-03-28deps: upgrade libuv to 7514149Ben Noordhuis
2013-03-27openssl: disable HEARTBEAT TLS extensionFedor Indutny
Microsoft's IIS doesn't support it, and is not replying with ServerHello after receiving ClientHello which contains it. The good way might be allowing to opt-out this at runtime from javascript-land, but unfortunately OpenSSL doesn't support it right now. see #5119