-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Comparing changes
Open a pull request
base repository: websockets/ws
base: 8.6.0
head repository: websockets/ws
compare: 8.8.1
- 20 commits
- 10 files changed
- 3 contributors
Commits on May 20, 2022
-
[minor] Clarify why the handshake is aborted
Add more details about why the handshake is aborted in the HTTP response. Refs: #2045 (comment)
Configuration menu - View commit details
-
Copy full SHA for e56cdfe - Browse repository at this point
Copy the full SHA e56cdfeView commit details
Commits on May 21, 2022
-
[fix] Abort the handshake if the Upgrade header is invalid
Close the connection if the Upgrade header field in the HTTP response contains a value that is not an ASCII case-insensitive match for the value "websocket".
Configuration menu - View commit details
-
Copy full SHA for 0fdcc0a - Browse repository at this point
Copy the full SHA 0fdcc0aView commit details -
[minor] Use consistent error messages
Make some server error messages consistent with the respective client error messages.
Configuration menu - View commit details
-
Copy full SHA for fb658bd - Browse repository at this point
Copy the full SHA fb658bdView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8889e48 - Browse repository at this point
Copy the full SHA 8889e48View commit details -
Configuration menu - View commit details
-
Copy full SHA for a690791 - Browse repository at this point
Copy the full SHA a690791View commit details
Commits on May 26, 2022
-
[security] Drop sensitive headers when following insecure redirects
Drop the `Authorization` and `Cookie` headers if the original request for the opening handshake is sent over HTTPS and the client is redirected to the same host over plain HTTP (wss: to ws:). If an HTTPS server redirects to same host over plain HTTP, the problem is on the server, but handling this condition is not hard and reduces the risk of leaking credentials due to MITM issues. Refs: 6946f5fe
Configuration menu - View commit details
-
Copy full SHA for d68ba9e - Browse repository at this point
Copy the full SHA d68ba9eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 903ec62 - Browse repository at this point
Copy the full SHA 903ec62View commit details -
[feature] Introduce the
'wsClientError'
event (#2046)Add the ability to inspect the invalid handshake requests and respond to them with a custom HTTP response. Closes #2045
Configuration menu - View commit details
-
Copy full SHA for 6e5a5ce - Browse repository at this point
Copy the full SHA 6e5a5ceView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4b62fbf - Browse repository at this point
Copy the full SHA 4b62fbfView commit details
Commits on May 30, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 5e4149e - Browse repository at this point
Copy the full SHA 5e4149eView commit details
Commits on Jun 4, 2022
-
Configuration menu - View commit details
-
Copy full SHA for a6dbd1c - Browse repository at this point
Copy the full SHA a6dbd1cView commit details
Commits on Jun 8, 2022
-
Configuration menu - View commit details
-
Copy full SHA for c1a126f - Browse repository at this point
Copy the full SHA c1a126fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 0792742 - Browse repository at this point
Copy the full SHA 0792742View commit details
Commits on Jun 9, 2022
-
[feature] Add the
WS_NO_{BUFFER_UTIL, UTF_8_VALIDATE}
variablesWhen set to non empty values, the `WS_NO_BUFFER_UTIL` and `WS_NO_UTF_8_VALIDATE` environment variables, prevent the optional `bufferutil` and `utf-8-validate` dependencies from being required, respectively. These might be useful to enhance security in systems where a user can put a package in the package search path of an application of another user, due to how the Node.js resolver algorithm works.
Configuration menu - View commit details
-
Copy full SHA for becf237 - Browse repository at this point
Copy the full SHA becf237View commit details -
Configuration menu - View commit details
-
Copy full SHA for 982b782 - Browse repository at this point
Copy the full SHA 982b782View commit details
Commits on Jun 20, 2022
-
[minor] Prevent opening handshake headers from being overridden
Ensure that the `Connection`, `Sec-WebSocket-Key`, `Sec-WebSocket-Version`, and `Upgrade` headers are not overridden. Refs: #2048 (comment)
Configuration menu - View commit details
-
Copy full SHA for 3b6af82 - Browse repository at this point
Copy the full SHA 3b6af82View commit details
Commits on Jun 30, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 1117af6 - Browse repository at this point
Copy the full SHA 1117af6View commit details
Commits on Jul 15, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 0ae302a - Browse repository at this point
Copy the full SHA 0ae302aView commit details -
[security] Fix same host check for ws+unix: redirects
Drop the `Authorization` and `Cookie` headers if the original request for the opening handshake is sent to an IPC server and the client is redirected to a TCP server (ws+unix: to ws: or wss:), and vice versa (ws: or wss: to ws+unix). Also drop the `Authorization` and `Cookie` headers if the original request for the opening handshake is sent to an IPC server and the client is redirected to another IPC server. Refs: 6946f5fe
Configuration menu - View commit details
-
Copy full SHA for bc8bd34 - Browse repository at this point
Copy the full SHA bc8bd34View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9753821 - Browse repository at this point
Copy the full SHA 9753821View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff 8.6.0...8.8.1