summaryrefslogtreecommitdiff
path: root/std/textproto/mod.ts
AgeCommit message (Collapse)Author
2021-02-02chore: remove std directory (#9361)Casper Beyer
This removes the std folder from the tree. Various parts of the tests are pretty tightly dependent on std (47 direct imports and 75 indirect imports, not counting the cli tests that use them as fixtures) so I've added std as a submodule for now.
2021-01-10update copyright to 2021 (#9081)Ryan Dahl
2020-09-21chore: add copyright (#7593)tokiedokie
2020-07-14Use dprint for internal formatting (#6682)David Sherret
2020-07-08feat: add --no-check option (#6456)Kitson Kelly
This commit adds a "--no-check" option to following subcommands: - "deno cache" - "deno info" - "deno run" - "deno test" The "--no-check" options allows to skip type checking step and instead directly transpiles TS sources to JS sources. This solution uses `ts.transpileModule()` API and is just an interim solution before implementing it fully in Rust.
2020-06-25refactor: shift copyBytes and tweak deps to reduce dependencies (#6469)Chris Knight
2020-06-12make std deno-lint clean (#6240)Ryan Dahl
Co-authored-by: Bartek Iwańczuk <biwanczuk@gmail.com>
2020-05-19fix(multipart): fix error when parsing file name in utf8 format (#5428)zfx
2020-05-15fix link (#5333)Claudio Cicali
Replaced with the current master version
2020-04-28BREAKING: Remove Deno.EOF, use null instead (#4953)Nayeem Rahman
2020-04-06Drop headers with trailing whitespace in header name (#4642)Andrew Stucki
This relates directly to [an issue](https://github.com/denoland/deno_std/issues/620) that I initially raised in `deno_std` awhile back, and was reminded about it today when the `oak` project popped up on my github recommended repos. As of now Deno's http servers are vulnerable to the same underlying issue of go CVE-2019-16276 due to the fact that it's based off of ported go code from their old standard library. [Here's the commit that fixed the CVE.](https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8) Long story short, some off the shelf proxies and caching servers allow for passing unaltered malformed headers to backends that they're fronting. When they pass invalid headers that they don't understand this can cause issues with HTTP request smuggling. I believe that to this date, this is the default behavior of AWS ALBs--meaning any server that strips whitespace from the tail end of header field names and then interprets the header, when placed behind an ALB, is susceptible to request smuggling. The current behavior is actually specifically called out in [RFC 7230](https://tools.ietf.org/html/rfc7230#section-3.2.4) as something that MUST result in a rejected message, but the change corresponding to this PR, is more lenient and what both go and nginx currently do, and is better than the current behavior.
2020-04-01Move encode, decode helpers to /std/encoding/utf8.ts, delete /std/strings/ ↵Ryan Dahl
(#4565) also removes std/encoding/mod.ts and std/archive/mod.ts which are useless.
2020-03-22clean up textproto code in std (#4458)Yusuke Sakurai
- moved and renamed append() into bytes from ws and textproto - renamed textproto/readder_tests.ts -> textproto/test.ts
2020-03-13fix(std): Use Deno.errors where possible. (#4356)Oliver Lenehan
2020-02-19Enable TS strict mode by default (#3899)Maximilien Mellen
Fixes #3324 Co-authored-by: Kitson Kelly <me@kitsonkelly.com>
2020-02-07remove non-null assertion operator from std (part1) (#3900)Yusuke Sakurai
2019-10-09Move everything into std subdirRyan Dahl