chore(deps): update node.js to v12.22.7
This PR contains the following updates:
| Package | Update | Change |
|---|---|---|
| node | minor | 12.19.1 -> 12.22.7 |
Release Notes
nodejs/node
v12.22.7
This is a security release.
Notable changes
-
CVE-2021-22959: HTTP Request Smuggling due to spaced in headers (Medium)
- The http parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS). More details will be available at CVE-2021-22959 after publication.
-
CVE-2021-22960: HTTP Request Smuggling when parsing the body (Medium)
- The parse ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions. More details will be available at CVE-2021-22960 after publication.
Commits
- [
21a2e554e3] - deps: update llhttp to 2.1.4 (Fedor Indutny) nodejs-private/node-private#β286 - [
d5d3a03246] - http: add regression test for smuggling content length (Matteo Collina) nodejs-private/node-private#β286 - [
0858587f21] - http: add regression test for chunked smuggling (Matteo Collina) nodejs-private/node-private#β286
v12.22.6
This is a security release.
Notable Changes
These are vulnerabilities in the node-tar, arborist, and npm cli modules which are related to the initial reports and subsequent remediation of node-tar vulnerabilities CVE-2021-32803 and CVE-2021-32804. Subsequent internal security review of node-tar and additional external bounty reports have resulted in another 5 CVE being remediated in core npm CLI dependencies including node-tar, and npm arborist.
You can read more about it in:
Commits
- [
a0154b586b] - deps: update archs files for OpenSSL-1.1.1l (Richard Lau) #β39869 - [
7a95637eb7] - deps: upgrade openssl sources to 1.1.1l (Richard Lau) #β39869 - [
840b0ffff6] - deps: upgrade npm to 6.14.15 (Darcy Clarke) #β39856
v12.22.5
This is a security release.
Notable Changes
-
CVE-2021-3672/CVE-2021-22931: Improper handling of untypical characters in domain names (High)
- Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library which can lead to the output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22931.
-
CVE-2021-22940: Use after free on close http2 on stream canceling (High)
- Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. This release includes a follow-up fix for CVE-2021-22930 as the issue was not completely resolved by the previous fix. You can read more about it at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940.
-
CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (Low)
- If the Node.js HTTPS API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted. You can read more about it at https://nvd.nist.gov/vuln/detail/CVE-2021-22939.
Commits
- [
5f947db68c] - deps: update c-ares to 1.17.2 (Beth Griggs) #β39724 - [
42695ea34b] - deps: reflect c-ares source tree (Beth Griggs) #β39653 - [
e4c9156b32] - deps: apply missed updates from c-ares 1.17.1 (Beth Griggs) #β39653 - [
9cd1f53103] - http2: add tests for cancel event while client is paused reading (Akshay K) #β39622 - [
2008c9722f] - http2: update handling of rst_stream with error code NGHTTP2_CANCEL (Akshay K) #β39622 - [
1780bbc329] - tls: validate "rejectUnauthorized: undefined" (Matteo Collina) nodejs-private/node-private#β276
v12.22.4
This is a security release.
Notable Changes
-
CVE-2021-22930: Use after free on close http2 on stream canceling (High)
- Node.js is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930
Commits
- [
499e56babe] - build: fix label-pr workflow (MichaΓ«l Zasso) #β38399 - [
98ac3c4108] - build: label PRs with GitHub Action instead of nodejs-github-bot (Phillip Johnsen) #β38301 - [
ddc8dde150] - deps: upgrade npm to 6.14.14 (Darcy Clarke) #β39553 - [
e11a862eed] - deps: update to c-ares 1.17.1 (Danny Sonnenschein) #β36207 - [
39e9cd540f] - deps: restore minimum ICU version to 65 (Richard Lau) #β39068 - [
e459c79b02] - deps: V8: cherry-pick035c305(MichaΓ«l Zasso) #β38497 - [
b3c698a5d8] - deps: update to [email protected] (Guy Bedford) #β38450 - [
7d5a2f9588] - deps: update to [email protected] (Guy Bedford) #β37992 - [
906b43e586] - deps: V8: update build dependencies (MichaΓ«l Zasso) #β39245 - [
15b91fa3fa] - deps: V8: backport8959494(MichaΓ«l Zasso) #β39245 - [
8046daf09f] - deps: V8: cherry-pick0b3a4ec(MichaΓ«l Zasso) #β39245 - [
f4377b13a6] - deps: V8: cherry-pick7c182bd(MichaΓ«l Zasso) #β39245 - [
add7b5b4c2] - deps: V8: cherry-pickcc641f6(MichaΓ«l Zasso) #β39245 - [
a73275f056] - deps: V8: cherry-pick7b33328(MichaΓ«l Zasso) #β39245 - [
492b0d6b37] - deps: V8: cherry-picke6f62a4(MichaΓ«l Zasso) #β39245 - [
2b54156260] - deps: V8: cherry-pick92e6d33(MichaΓ«l Zasso) #β39245 - [
bbceab4d91] - deps: V8: backport1b1eda0(MichaΓ«l Zasso) #β39245 - [
93a1a3c5ae] - deps: V8: cherry-pick530080c(Milad Fa) #β38509 - [
b263f2585a] - http2: on receiving rst_stream with cancel code add it to pending list (Akshay K) #β39423 - [
3e4bc1b0d3] - module: fix legacynodespecifier resolution to resolve"main"field (Antoine du Hamel) #β38979 - [
f552c45676] - src: move CHECK in AddIsolateFinishedCallback (Fedor Indutny) #β38010 - [
30ce0e66ae] - src: update cares_wrap OpenBSD defines (Anna Henningsen) #β38670
v12.22.3
Notable Changes
Node.js 12.22.2 introduced a regression in the Windows installer on non-English locales that is being fixed in this release. There is no need to download this release if you are not using the Windows installer.
Commits
- [
182f86a4d4] - win,msi: use localized "Authenticated Users" name (Richard Lau) #β39241
v12.22.2
This is a security release.
Notable Changes
Vulnerabilities fixed:
-
CVE-2021-22918: libuv upgrade - Out of bounds read (Medium)
- Node.js is vulnerable to out-of-bounds read in libuv's uv__idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
-
CVE-2021-22921: Windows installer - Node Installer Local Privilege Escalation (Medium)
- Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921
-
CVE-2021-27290: npm upgrade - ssri Regular Expression Denial of Service (ReDoS) (High)
- This is a vulnerability in the ssri npm mudule which may be vulnerable to denial of service attacks. You can read more about it in https://github.com/advisories/GHSA-vx3p-948g-6vhq
-
CVE-2021-23362: npm upgrade - hosted-git-info Regular Expression Denial of Service (ReDoS) (Medium)
- This is a vulnerability in the hosted-git-info npm mudule which may be vulnerable to denial of service attacks. You can read more about it in https://nvd.nist.gov/vuln/detail/CVE-2021-23362
Commits
- [
623fd1fcb5] - deps: uv: cherry-pick99c29c9(Ben Noordhuis) nodejs-private/node-private#β267 - [
923b3760f8] - deps: upgrade npm to 6.14.13 (Ruy Adorno) #β38214 - [
a52790cba0] - win,msi: set install directory permission (AkshayK) nodejs-private/node-private#β269
v12.22.1
This is a security release.
Notable Changes
Vulnerabilities fixed:
-
CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High)
- This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
- Impacts:
- All versions of the 15.x, 14.x, 12.x and 10.x releases lines
-
CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (High)
- This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt
- Impacts:
- All versions of the 15.x, 14.x, 12.x and 10.x releases lines
-
CVE-2020-7774: npm upgrade - Update y18n to fix Prototype-Pollution (High)
- This is a vulnerability in the y18n npm module which may be exploited by prototype pollution. You can read more about it in https://github.com/advisories/GHSA-c4w7-xm78-47vh
- Impacts:
- All versions of the 14.x, 12.x and 10.x releases lines
Commits
- [
c947f1a0e1] - deps: upgrade npm to 6.14.12 (Ruy Adorno) #β37918 - [
51a753c06f] - deps: update archs files for OpenSSL-1.1.1k (Tobias NieΓen) #β37939 - [
c85a519b48] - deps: upgrade openssl sources to 1.1.1k (Tobias NieΓen) #β37939
v12.22.0
Notable changes
The legacy HTTP parser is runtime deprecated
The legacy HTTP parser, selected by the --http-parser=legacy command line
option, is deprecated with the pending End-of-Life of Node.js 10.x (where it
is the only HTTP parser implementation provided) at the end of April 2021. It
will now warn on use but otherwise continue to function and may be removed in
a future Node.js 12.x release.
The default HTTP parser based on llhttp is not affected. By default it is
stricter than the now deprecated legacy HTTP parser. If interoperability with
HTTP implementations that send invalid HTTP headers is required, the HTTP
parser can be started in a less secure mode with the --insecure-http-parser
command line option.
Contributed by Beth Griggs #β37603.
ES Modules
ES Modules are now considered stable.
Contributed by Guy Bedford #β35781
node-api
Updated to node-api version 8 and added an experimental API to allow retrieval of the add-on file name.
Contributed by Gabriel Schulhof #β37652 and #β37195.
New API's to control code coverage data collection
v8.stopCoverage() and v8.takeCoverage() have been added.
Contributed by Joyee Cheung #β33807.
New API to monitor event loop utilization by Worker threads
worker.performance.eventLoopUtilization() has been added.
Contributed by Trevor Norris #β35664.
Commits
- [
1872625990] - (SEMVER-MINOR) deps: update to [email protected] (Guy Bedford) #β37712 - [
dfa04d9035] - deps: V8: cherry-pickbeebee4(Peter Marshall) #β37293 - [
bf8733fe22] - doc: mark modules implementation as stable (Guy Bedford) #β35781 - [
0a35d49f56] - Revert "embedding: make Stop() stop Workers" (Anna Henningsen) #β32623 - [
a0b610450a] - (SEMVER-MINOR) http: runtime deprecate legacy HTTP parser (Beth Griggs) #β37603 - [
2da24ac302] - lib: add URI handling functions to primordials (Antoine du Hamel) #β37394 - [
7b0ed4ba92] - module: improve support of data: URLs (Antoine du Hamel) #β37392 - [
93dd799a86] - (SEMVER-MINOR) node-api: define version 8 (Gabriel Schulhof) #β37652 - [
f5692093d3] - (SEMVER-MINOR) node-api: allow retrieval of add-on file name (Gabriel Schulhof) #β37195 - [
6cef0e3678] - src,test: add regression test for nested Worker termination (Anna Henningsen) #β32623 - [
364bf03a68] - test: fix races in test-performance-eventlooputil (Gerhard Stoebich) #β36028 - [
d7a4ccdf09] - test: correct test-worker-eventlooputil (Gerhard Stoebich) #β35891 - [
0f6d44500c] - test: add cpu-profiler-crash test (Santiago Gimeno) #β37293 - [
86f34ee18c] - (SEMVER-MINOR) v8: implement v8.stopCoverage() (Joyee Cheung) #β33807 - [
8ddea3f16d] - (SEMVER-MINOR) v8: implement v8.takeCoverage() (Joyee Cheung) #β33807 - [
eec7542781] - (SEMVER-MINOR) worker: add eventLoopUtilization() (Trevor Norris) #β35664
v12.21.0
This is a security release.
Notable changes
Vulnerabilities fixed:
-
CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion
- Affected Node.js versions are vulnerable to denial of service attacks when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
-
CVE-2021-22884: DNS rebinding in --inspect
- Affected Node.js versions are vulnerable to denial of service attacks when the whitelist includes βlocalhost6β. When βlocalhost6β is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the βlocalhost6β domain. As long as the attacker uses the βlocalhost6β domain, they can still apply the attack described in CVE-2018-7160.
-
CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate
- This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210216.txt
Commits
- [
e69177a088] - deps: update archs files for OpenSSL-1.1.1j (Daniel Bevenius) #β37413 - [
0633ae77e6] - deps: upgrade openssl sources to 1.1.1j (Daniel Bevenius) #β37413 - [
922ada7713] - (SEMVER-MINOR) http2: add unknownProtocol timeout (Daniel Bevenius) nodejs-private/node-private#β246 - [
1564752d55] - src: drop localhost6 as allowed host for inspector (Matteo Collina) nodejs-private/node-private#β244
v12.20.2
Notable changes
-
deps:
- upgrade npm to 6.14.11 (Ruy Adorno) #β37173
Commits
- [
e8a4e560ea] - async_hooks: fix leak in AsyncLocalStorage exit (Stephen Belanger) #β35779 - [
427968d266] - deps: upgrade npm to 6.14.11 (Ruy Adorno) #β37173 - [
cd9a8106be] - http: do not loop over prototype in Agent (MichaΓ«l Zasso) #β36410 - [
4ac8f37800] - http2: check write not scheduled in scope destructor (David Halls) #β36241
v12.20.1
Notable changes
This is a security release.
Vulnerabilities fixed:
- CVE-2020-8265: use-after-free in TLSWrap (High) Affected Node.js versions are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits
- CVE-2020-8287: HTTP Request Smuggling in nodejs Affected versions of Node.js allow two copies of a header field in a http request. For example, two Transfer-Encoding header fields. In this case Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling (https://cwe.mitre.org/data/definitions/444.html).
- CVE-2020-1971: OpenSSL - EDIPARTYNAME NULL pointer de-reference (High) This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20201208.txt
Commits
- [
5de5354918] - deps: update http-parser to http-parser@ec8b5ee(Richard Lau) nodejs-private/node-private#β236 - [
2eacfbec68] - deps: upgrade npm to 6.14.10 (Ruy Adorno) #β36571 - [
96ec482d90] - deps: update archs files for OpenSSL-1.1.1i (Myles Borins) #β36521 - [
7ec0eb408b] - deps: upgrade openssl sources to 1.1.1i (Myles Borins) #β36521 - [
76ea9c5a7a] - deps: upgrade npm to 6.14.9 (Myles Borins) #β36450 - [
420244e4d9] - http: unsetF_CHUNKEDon newTransfer-Encoding(Matteo Collina) nodejs-private/node-private#β236 - [
4a30ac8c75] - http: add test for http transfer encoding smuggling (Richard Lau) nodejs-private/node-private#β236 - [
92d430917a] - http: unsetF_CHUNKEDon newTransfer-Encoding(Fedor Indutny) nodejs-private/node-private#β236 - [
5b00de7d67] - src: retain pointers to WriteWrap/ShutdownWrap (James M Snell) nodejs-private/node-private#β230
v12.20.0
Notable Changes
-
crypto:
- update certdata to NSS 3.56 (Shelley Vohr) https://github.com/nodejs/node/pull/35546ll/35546
-
deps:
- update llhttp to 2.1.3 (Fedor Indutny) https://github.com/nodejs/node/pull/35435ll/35435
- (SEMVER-MINOR) upgrade to libuv 1.40.0 (Colin Ihrig) https://github.com/nodejs/node/pull/35333ll/35333
-
doc:
- add aduh95 to collaborators (Antoine du Hamel) https://github.com/nodejs/node/pull/35542ll/35542
-
fs:
- (SEMVER-MINOR) add .ref() and .unref() methods to watcher classes (rickyes) https://github.com/nodejs/node/pull/33134ll/33134
-
http:
- (SEMVER-MINOR) added scheduling option to http agent (delvedor) https://github.com/nodejs/node/pull/33278ll/33278
-
module:
- (SEMVER-MINOR) exports pattern support (Guy Bedford) https://github.com/nodejs/node/pull/34718ll/34718
- (SEMVER-MINOR) named exports for CJS via static analysis (Guy Bedford) https://github.com/nodejs/node/pull/35249ll/35249
-
n-api:
- (SEMVER-MINOR) add more property defaults (Gerhard Stoebich) https://github.com/nodejs/node/pull/35214ll/35214
-
src:
- (SEMVER-MINOR) move node_contextify to modern THROW_ERR_* (James M Snell)https://github.com/nodejs/node/pull/35470ull/35470
- (SEMVER-MINOR) move node_process to modern THROW_ERR* (James M Snell)https://github.com/nodejs/node/pull/35472ull/35472
- (SEMVER-MINOR) expose v8::Isolate setup callbacks (Shelley Vohr) https://github.com/nodejs/node/pull/35512ll/35512
Commits
- [
c6eb0b62d9] - benchmark: ignore build artifacts for napi addons (Richard Lau) #β35970 - [
f3a045720c] - build: fuzzer that targets node::LoadEnvironment() (davkor) #β34844 - [
48bc3fcd4c] - build: improved release lint error message (Shelley Vohr) #β35523 - [
2e766a6adf] - console: add Symbol.toStringTag property (Leko) #β35399 - [
90244362cc] - crypto: fix KeyObject garbage collection (Anna Henningsen) #β35481 - [
42f64eba89] - crypto: update certdata to NSS 3.56 (Shelley Vohr) #β35546 - [
a6f58c0888] - crypto: set env values in KeyObject Deserialize method (ThakurKarthik) #β35416 - [
6539cf2725] - deps: upgrade to [email protected] (Guy Bedford) #β35928 - [
bdcc77bdf4] - deps: update to [email protected] (Guy Bedford) #β35901 - [
5b8d3c74e8] - deps: upgrade to [email protected] (Guy Bedford) #β35871 - [
d7f0e3e5f0] - deps: update to [email protected] (Guy Bedford) #β35745 - [
0a1474d9df] - deps: update llhttp to 2.1.3 (Fedor Indutny) #β35435 - [
cf07a8695a] - deps: upgrade to libuv 1.40.0 (Colin Ihrig) #β35333 - [
cc11464b4e] - deps: upgrade to c-ares v1.16.1 (Shelley Vohr) #β35324 - [
5405e62eaf] - deps: update to uvwasi 0.0.11 (Colin Ihrig) #β35104 - [
44c739cc49] - deps: V8: cherry-pick6be2f6e(Benjamin Coe) #β35055 - [
b78a1a186f] - doc: update releaser in v12.18.4 changelog (Beth Griggs) #β35217 - [
1cd1d0159d] - doc: move package.import content higher (Myles Borins) #β35535 - [
79f3c323f6] - doc: fix broken links in modules.md (Rich Trott) #β35182 - [
b4941cfaec] - doc: make minor improvements to module.md (Rich Trott) #β35083 - [
7dc3b74c34] - doc: add ESM examples inmoduleAPI doc page (Antoine du HAMEL) #β34875 - [
f0b06b64ff] - doc: move module core module doc to separate page (Antoine du HAMEL) #β34747 - [
77555d8500] - doc: put landing specifics in details tag (Rich Trott) #β35296 - [
b50b34b30e] - doc: put release script specifics in details (Myles Borins) #β35260 - [
1a8f3a844e] - doc: copyedit esm.md (Rich Trott) #β35414 - [
d99120040c] - doc: error code fix in resolver spec (Guy Bedford) #β34998 - [
df52814113] - doc: document Buffer.concat may use internal pool (Andrey Pechkurov) #β35541 - [
42a587f9ba] - doc: use test username instead of real (Pooja D.P) #β35611 - [
bfff4fc3c9] - doc: revise description of process.ppid (Pooja D.P) #β35589 - [
a9ac75480f] - doc: add symlink information for process.execpath (Pooja D.P) #β35590 - [
5fea51b66c] - doc: add PoojaDurgad as a triager (Pooja D.P) #β35153 - [
a0b541c3e0] - doc: use kbd element in process doc (Rich Trott) #β35584 - [
992355cdf9] - doc: simplify wording in tracing APIs doc (Pooja D.P) #β35556 - [
05db4b8343] - doc: improve SIGINT error text (Rich Trott) #β35558 - [
42c479572c] - doc: use sentence case for class property (Rich Trott) #β35540 - [
fb9bb05ee2] - doc: fix util.inspect change history (Antoine du Hamel) #β35528 - [
6952c45202] - doc: add aduh95 to collaborators (Antoine du Hamel) #β35542 - [
b5f752528b] - doc: update AUTHORS list (Anna Henningsen) #β35280 - [
370f8e3afd] - doc: update sxa's email address to Red Hat from IBM (Stewart X Addison) #β35442 - [
edf3fbbd14] - doc: update contact information for @βBethGriggs (Beth Griggs) #β35451 - [
8be289e58c] - doc: update contact information for richardlau (Richard Lau) #β35450 - [
42c0dfcc23] - doc: importable node protocol URLs (Bradley Meck) #β35434 - [
c192af66e7] - doc: unhide resolver spec (Guy Bedford) #β35358 - [
b0e43c718c] - doc: add gpg key export directions to releases doc (Danielle Adams) #β35298 - [
884755f1e5] - doc: simplify circular dependencies text in modules.md (Rich Trott) #β35126 - [
85c47d753c] - doc: avoid double-while sentence in perf_hooks.md (Rich Trott) #β35078 - [
68c5ee45a2] - doc: update fs promise-based examples (Richard Lau) #β35760 - [
66f8730441] - doc: add history entry for exports patterns (Antoine du Hamel) #β35410 - [
a7e66b635d] - doc: fix conditional exports flag removal version (Antoine du Hamel) #β35428 - [
9197a6651d] - doc: copyedit packages.md (Rich Trott) #β35427 - [
f507ca9e21] - doc: packages docs feedback (Guy Bedford) #β35370 - [
5330930128] - doc: refine require/import conditions constraints (Guy Bedford) #β35311 - [
5f0b1571a7] - doc: edit subpath export patterns introduction (Rich Trott) #β35254 - [
d6a13a947e] - doc: document support for package.json fields (Antoine du HAMEL) #β34970 - [
7c1700e143] - doc: move package config docs to separate page (Antoine du HAMEL) #β34748 - [
7510667d87] - doc: rename module pages (Antoine du HAMEL) #β34663 - [
b644ab6ae6] - doc: fix line length in worker_threads.md (Jucke) #β34419 - [
fb9b66bdd7] - doc: fix typos in n-api, tls and worker_threads (Jucke) #β34419 - [
1f34230373] - doc,esm: document experimental warning removal (Antoine du Hamel) #β35750 - [
985b96a7d5] - doc,esm: add history support info (Antoine du Hamel) #β35395 - [
548137f4ec] - errors: simplify ERR_REQUIRE_ESM message generation (Rich Trott) #β35123 - [
f22672de18] - errors: improve ERR_INVALID_OPT_VALUE error (Denys Otrishko) #β34671 - [
7a98961a26] - esm: fix hook mistypes and links to types (Derek Lewis) #β34240 - [
0f757bc2df] - esm: use "node:" namespace for builtins (Guy Bedford) #β35387 - [
b48473228c] - events: assume an EventEmitter if emitter.on is a function (Luigi Pinca) #β35818 - [
19d711391e] - fs: simplify realpathSync (himself65) #β35413 - [
decfc2ae5c] - fs: add .ref() and .unref() methods to watcher classes (rickyes) #β33134 - [
cce464513e] - http: added scheduling option to http agent (delvedor) #β33278 - [
d477e2e147] - http: only set keep-alive when not exists (atian25@βqq.com) #β35138 - [
f10d721737] - http: reset headers timeout on headers complete (Robert Nagy) #β34578 - [
c8a778985b] - http2: avoid unnecessary buffer resize (Denys Otrishko) #β34480 - [
b732c92e3d] - http2: use and support non-empty DATA frame with END_STREAM flag (Carlos Lopez) #β33875 - [
bfce0eb13a] - Revert "http2: streamline OnStreamRead streamline memory accounting" (Rich Trott) #β34315 - [
e85ca7af43] - http2: wait for session socket writable end on close/destroy (Denys Otrishko) #β30854 - [
2471197099] - http2: wait for session to finish writing before destroy (Denys Otrishko) #β30854 - [
82af8acc8e] - http2,doc: minor fixes (Alba Mendez) #β28044 - [
a3e8829d4a] - inspector: do not hardcode Debugger.CallFrameId in tests (Dmitry Gozman) #β35570 - [
6efa140f8f] - lib: change http client path assignment (Yohanan Baruchel) #β35508 - [
ad7281b081] - lib: use remaining typed arrays from primordials (MichaΓ«l Zasso) #β35499 - [
a9a606f06b] - lib: use full URL to GitHub issues in comments (Rich Trott) #β34686 - [
ea239392c2] - module: [email protected] big endian fix (Guy Bedford) #β35634 - [
354f358c1b] - module: use Wasm CJS lexer when available (Guy Bedford) #β35583 - [
76f76017bf] - module: fix builtin reexport tracing (Guy Bedford) #β35500 - [
992af4e112] - module: fix specifier resolution option value (himself65) #β35098 - [
1ff956f49e] - module: remove experimental modules warning (Guy Bedford) #β31974 - [
41af927efb] - module: exports pattern support (Guy Bedford) #β34718 - [
a18d0df33a] - module: update to [email protected] (Guy Bedford) #β35501 - [
6ca8fb552d] - module: refine module type mismatch error cases (Guy Bedford) #β35426 - [
9eb1fa1924] - module: named exports for CJS via static analysis (Guy Bedford) #β35249 - [
a93ca2d494] - n-api: revert change to finalization (Michael Dawson) #β35777 - [
5faaa603d8] - n-api: support for object freeze/seal (Shelley Vohr) #β35359 - [
d938e8508b] - n-api: add more property defaults (Gerhard Stoebich) #β35214 - [
18f01ddcb5] - repl: improve static import error message in repl (Myles Borins) #β33588 - [
70768ce109] - repl: give repl entries unique names (Bradley Meck) #β34372 - [
e9bee3950c] - src: move node_contextify to modern THROW_ERR_* (James M Snell) #β35470 - [
b741f2ff84] - src: move node_process to modern THROW_ERR* (James M Snell) #β35472 - [
2d5393bb28] - src: fix freeing unintialized pointer bug in ParseSoaReply (Aastha Gupta) #β35502 - [
dec004f742] - src: expose v8::Isolate setup callbacks (Shelley Vohr) #β35512 - [
7f8834f76c] - src: more idiomatic error pattern in node_wasi (James M Snell) #β35493 - [
ade27b732b] - src: use env->ThrowUVException in pipe_wrap (James M Snell) #β35493 - [
e70b05208f] - src: remove invalid ToLocalChecked in EmitBeforeExit (Anna Henningsen) #β35484 - [
cd80195524] - src: make MakeCallback() check can_call_into_js before getting method (Anna Henningsen) #β35424 - [
8a1091648c] - stream: destroy wrapped streams on error (Robert Nagy) #β34102 - [
fdc67ebf5f] - test: replace annonymous functions with arrow (Pooja D.P) #β34921 - [
c3e1bf78c4] - test: add wasi readdir() test (Colin Ihrig) #β35202 - [
607f3c5d84] - test: fix comment about DNS lookup test (Tobias NieΓen) #β35080 - [
02787ce5d1] - test: add ALPNProtocols option to clientOptions (Luigi Pinca) #β35482 - [
12d76b8e8e] - tls: reset secureConnecting on client socket (David Halls) #β33209 - [
adf4f90bce] - tools: refloat 7 Node.js patches to cpplint.py (Rich Trott) #β35569 - [
1173efca27] - tools: bump cpplint.py to 1.4.6 (Rich Trott) #β35569 - [
09552670fe] - tools: add missing uv_setup_argv() calls (Anna Henningsen) #β35491 - [
ae149232a1] - tools: exclude gyp from markdown link checker (MichaΓ«l Zasso) #β35423 - [
a9ce9b2614] - tools: update ESLint to 7.10.0 (Colin Ihrig) #β35366 - [
bc7da0c22c] - tools: ignore build folder when checking links (Ash Cripps) #β35315 - [
f29717437f] - tools,doc: enforce alphabetical order for md refs (Antoine du Hamel) #β35244 - [
11b10d7d1f] - tools,doc: upgrade dependencies (Antoine du Hamel) #β35244
Configuration
π Schedule: At any time (no schedule defined).
π¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.
β» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
π Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, click this checkbox.
This PR has been generated by WhiteSource Renovate. View repository job log here.