Permalink
Switch branches/tags
V8-icu-patch-4.x abernix/revert-range-8 archived-io.js-v0.10 archived-io.js-v0.12 canary-base master meteor-patch-v8-debug-archive-restore process-exit-stdio-flushing v0.7.4-release v0.8.7-release v0.8.8-release v0.8.9-release v0.8.10-release v0.8.11-release v0.8.12-release v0.8.13-release v0.8.14-release v0.8.15-release v0.8.16-release v0.8.17-release v0.8.18-release v0.8.19-release v0.8.20-release v0.8.21-release v0.8.22-release v0.8.23-release v0.8.24-release v0.8.25-release v0.8.26-release v0.8.27-release v0.8.28-release v0.9.1-release v0.9.2-release v0.9.3-release v0.9.4-release v0.9.5-release v0.9.6-release v0.9.7-release v0.9.8-release v0.9.9-release v0.9.10-release v0.9.11-release v0.9.12-release v0.10-staging v0.10 v0.10.0-release v0.10.1-release v0.10.2-release v0.10.3-release v0.10.4-release v0.10.5-release v0.10.6-release v0.10.7-release v0.10.8-release v0.10.9-release v0.10.10-release v0.10.11-release v0.10.12-release v0.10.13-release v0.10.14-release v0.10.15-release v0.10.16-release v0.10.17-release v0.10.18-release v0.10.19-release v0.10.20-release v0.10.21-release v0.10.22-release v0.10.23-release v0.10.24-release v0.10.25-release v0.10.26-release v0.10.27-release v0.10.28-release v0.10.29-release v0.10.30-release v0.10.31-release v0.10.32-release v0.10.33-release v0.10.34-release v0.10.35-release v0.10.36-release v0.10.37-release v0.10.38-release v0.10.39-release v0.11.0-release v0.11.1-release v0.11.2-release v0.11.3-release v0.11.4-release v0.11.5-release v0.11.6-release v0.11.7-release v0.11.8-release v0.11.9-release v0.11.10-release v0.11.11-release v0.11.12-release v0.11.13-release v0.11.14-release v0.11.15-release v0.11.16-release v0.12-staging v0.12 v0.12.0-release v0.12.1-release v0.12.2-release v0.12.3-release v0.12.4-release v0.12.5-release v0.12.6-release v1.x v1.8.0-commit v2.0.2 v2.3.1-release v3.x v4.x-staging v4.x v4.0.0-rc v5.x v6.x-staging v6.x v7.x-staging v7.x v8.x-staging v8.x v8.11.0-meteor v8.11.1-meteor v8.11.2-meteor v8.12.0-meteor v9.x-staging v9.x
Nothing to show
Commits on Mar 30, 2018
  1. deps: V8: backport 596d55a from upstream

    MylesBorins authored and benjamn committed Sep 18, 2017
    Did not remove ActivationsFinder from `src/runtime/runtime-compiler.cc`
    as in the original commit as the Class is still being used prior to
    f0acede landing
    
    Original Commit Message:
    
        Deoptimization and multithreading.
    
        When using Lockers and Unlockers it is possible to create a
        scenario where multiple threads point to the same optimized
        code object. When that happens, if one of the threads triggers
        deoptimization, then the stack replacement needs to happen in
        the stacks of all threads.
        With this CL, the deoptimizer visits all threads to do so.
        The CL also adds three tests where V8 used to crash due to this
        issue.
    
        Bug: v8:6563
        Change-Id: I74e9af472d4833aa8d13e579df45133791f6a503
        Reviewed-on: https://chromium-review.googlesource.com/670783
        Reviewed-by: Jaroslav Sevcik <jarin@chromium.org>
        Commit-Queue: Juliana Patricia Vicente Franco <jupvfranco@google.com>
        Cr-Commit-Position: refs/heads/master@{#48060}
    
    PR-URL: nodejs#19477
    Fixes: nodejs#19274
    Refs: v8/v8@596d55a
    Refs: v8/v8@f0acede
    Reviewed-By: Gus Caplan <me@gus.host>
    Reviewed-By: Yang Guo <yangguo@chromium.org>
    Reviewed-By: Franziska Hinkelmann <franziska.hinkelmann@gmail.com>
    Reviewed-By: Benedikt Meurer <benedikt.meurer@gmail.com>
Commits on Mar 29, 2018
  1. 2018-03-29, Version 8.11.1 'Carbon' (LTS)

    MylesBorins committed Mar 29, 2018
    Notable changes:
    
    No additional commits.
    
    Due to incorrect staging of the upgrade to the GCC 4.9.X compiler, the
    latest releases for PPC little endian were built using GCC 4.9.X
    instead of GCC 4.8.X. This caused an ABI breakage on PPCLE based
    environments. This has been fixed in our infrastructure and we are
    doing this release to ensure that the hosted binaries are adhering to
    our platform support contract.
    
    Note that Node.js versions 10.X and later will be built with version
    4.9.X or later of the GCC compiler, and it is possible that Node.js
    version 8.X may be built on the 4.9.X compiler at a later time as the
    stated minimum compiler requirement for Node.js version 8.X is 4.9.4.
    
    Refs: https://github.com/nodejs/node/blob/v8.x/BUILDING.md
    PR-URL: nodejs#19679
Commits on Mar 28, 2018
  1. 2018-03-28, Version 8.11.0 'Carbon' (LTS)

    MylesBorins committed Mar 28, 2018
    This is a security release. All Node.js users should consult the
    security release summary at:
    
    https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
    
    for details on patched vulnerabilities.
    
    Fixes for the following CVEs are included in this release:
    
    * CVE-2018-7158
    * CVE-2018-7159
    * CVE-2018-7160
    
    Notable changes:
    
    * Upgrade to OpenSSL 1.0.2o: Does not contain any security fixes that
      are known to impact Node.js.
    * **Fix for inspector DNS rebinding vulnerability (CVE-2018-7160)**:
      A malicious website could use a DNS rebinding attack to trick a web
      browser to bypass same-origin-policy checks and allow HTTP
      connections to localhost or to hosts on the local network,
      potentially to an open inspector port as a debugger, therefore
      gaining full code execution access. The inspector now only allows
      connections that have a browser `Host` value of `localhost` or
      `localhost6`.
    * **Fix for `'path'` module regular expression denial of service
      (CVE-2018-7158)**: A regular expression used for parsing POSIX an
      Windows paths could be used to cause a denial of service if an
      attacker were able to have a specially crafted path string passed
      through one of the impacted `'path'` module functions.
    * **Reject spaces in HTTP `Content-Length` header values
      (CVE-2018-7159)**: The Node.js HTTP parser allowed for spaces inside
      `Content-Length` header values. Such values now lead to rejected
      connections in the same way as non-numeric values.
    * **Update root certificates**: 5 additional root certificates have
      been added to the Node.js binary and 30 have been removed.
    
    PR-URL: nodejs-private/node-private#112
  2. inspector: minor adjustments

    eugeneo authored and MylesBorins committed Mar 27, 2018
    Backport-PR-URL: nodejs-private/node-private#108
    PR-URL: nodejs-private/node-private#102
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
    Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
    Reviewed-By: Anna Henningsen <anna@addaleax.net>
  3. inspector: check Host header

    ofrobots authored and MylesBorins committed Mar 27, 2018
    Backport-PR-URL: nodejs-private/node-private#108
    PR-URL: nodejs-private/node-private#102
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
    Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
    Reviewed-By: Anna Henningsen <anna@addaleax.net>
  4. src: drop CNNIC+StartCom certificate whitelisting

    bnoordhuis authored and MylesBorins committed Mar 13, 2018
    Remove the CNNIC certificates again and remove the whitelist from commit
    3beb880 ("crypto: add cert check to CNNIC Whitelist") from June 2015.
    
    Backport-PR-URL: nodejs#19633
    PR-URL: nodejs#19322
    Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
  5. crypto: update root certificates

    bnoordhuis authored and MylesBorins committed Mar 13, 2018
    Update the list of root certificates in src/node_root_certs.h with
    tools/mk-ca-bundle.pl.
    
    Certificates added:
    - GDCA TrustAUTH R5 ROOT
    - SSL.com EV Root Certification Authority ECC
    - SSL.com EV Root Certification Authority RSA R2
    - SSL.com Root Certification Authority ECC
    - SSL.com Root Certification Authority RSA
    - TrustCor ECA-1
    - TrustCor RootCert CA-1
    - TrustCor RootCert CA-2
    
    Certificates removed:
    - ACEDICOM Root
    - AddTrust Low-Value Services Root
    - AddTrust Public Services Root
    - AddTrust ualified Certificates Root
    - CA Disig Root R1
    - Camerfirma Chambers of Commerce Root
    - Camerfirma Global Chambersign Root
    - CA WoSign ECC Root
    - Certification Authority of WoSign G2
    - Certinomis - Autorité Racine
    - Certum Root CA
    - China Internet Network Information Center EV Certificates Root
    - CNNIC ROOT
    - Comodo Secure Services root
    - Comodo Trusted Services root
    - DST ACES CA X6
    - GeoTrust Global CA 2
    - PSCProcert
    - Security Communication EV RootCA1
    - StartCom Certification Authority
    - StartCom Certification Authority
    - StartCom Certification Authority G2
    - Swisscom Root CA 1
    - Swisscom Root CA 2
    - Swisscom Root EV CA 2
    - TUBITAK UEKAE Kok Sertifika Hizmet Saglayicisi - Surum 3
    - TURKTRUST Certificate Services Provider Root 2007
    - UTN USERFirst Hardware Root CA
    - WoSign
    - WoSign China
    
    Backport-PR-URL: nodejs#19633
    PR-URL: nodejs#19322
    Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
  6. tools: update certdata.txt

    bnoordhuis authored and MylesBorins committed Mar 13, 2018
    This is the certdata.txt[0] from NSS 3.36, released on 2018-03-05.
    
    This is the version of NSS that will ship in Firefox 60 on 2018-05-01.
    
    [0] https://hg.mozilla.org/projects/nss/raw-file/NSS_3_36_RTM/lib/ckfw/builtins/certdata.txt
    
    Backport-PR-URL: nodejs#19633
    PR-URL: nodejs#19322
    Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
  7. deps: add -no_rand_screen to openssl s_client

    Shigeki Ohtsu authored and MylesBorins committed May 27, 2015
    In openssl s_client on Windows, RAND_screen() is invoked to initialize
    random state but it takes several seconds in each connection.
    This added -no_rand_screen to openssl s_client on Windows to skip
    RAND_screen() and gets a better performance in the unit test of
    test-tls-server-verify.
    Do not enable this except to use in the unit test.
    
    Backport-PR-URL: nodejs#19638
    Fixes: nodejs#1461
    PR-URL: nodejs#1836
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
  8. openssl: fix keypress requirement in apps on win32

    Shigeki Ohtsu authored and MylesBorins committed Feb 17, 2015
    Reapply b910613 .
    
    Backport-PR-URL: nodejs#19638
    Fixes: nodejs#589
    PR-URL: nodejs#1389
    Reviewed-By: Fedor Indutny <fedor@indutny.com>
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
  9. deps: fix asm build error of openssl in x86_win32

    Shigeki Ohtsu authored and MylesBorins committed Feb 13, 2015
    See
    https://mta.openssl.org/pipermail/openssl-dev/2015-February/000651.html
    
    iojs needs to stop using masm and move to nasm or yasm on Win32.
    
    Backport-PR-URL: nodejs#19638
    Fixes: nodejs#589
    PR-URL: nodejs#1389
    Reviewed-By: Fedor Indutny <fedor@indutny.com>
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
  10. deps: fix openssl assembly error on ia32 win32

    indutny authored and MylesBorins committed Jan 8, 2014
    `x86masm.pl` was mistakenly using .486 instruction set, why `cpuid` (and
    perhaps others) are requiring .686 .
    
    Backport-PR-URL: nodejs#19638
    Fixes: nodejs#589
    PR-URL: nodejs#1389
    Reviewed-By: Fedor Indutny <fedor@indutny.com>
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
    Reviewed-By: Shigeki Ohtsu <ohtsu@iij.ad.jp>
  11. deps: copy all openssl header files to include dir

    shigeki authored and MylesBorins committed Mar 27, 2018
    All symlink files in `deps/openssl/openssl/include/openssl/`
    are removed and replaced with real header files to avoid
    issues on Windows. Two files of opensslconf.h in crypto and
    include dir are replaced to refer config/opensslconf.h.
    
    PR-URL: nodejs#19638
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Tobias Nießen <tniessen@tnie.de>
    Reviewed-By: Rod Vagg <rod@vagg.org>
  12. deps: upgrade openssl sources to 1.0.2o

    shigeki authored and MylesBorins committed Mar 27, 2018
    This replaces all sources of openssl-1.0.2o.tar.gz into
    deps/openssl/openssl
    
    PR-URL: nodejs#19638
    Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Tobias Nießen <tniessen@tnie.de>
    Reviewed-By: Rod Vagg <rod@vagg.org>
  13. deps: reject interior blanks in Content-Length

    bnoordhuis authored and MylesBorins committed Mar 27, 2018
    Original commit message follows:
    
        Before this commit `Content-Length: 4 2` was accepted as a valid
        header and recorded as `parser->content_length = 42`.  Now it is
        a parse error that fails with error `HPE_INVALID_CONTENT_LENGTH`.
    
        Downstream users that inspect `parser->content_length` and naively
        parse the string value using `strtoul()` might get confused by the
        discrepancy between the two values.  Resolve that by simply not
        letting it happen.
    
    Fixes: nodejs-private/security#178
    PR-URL: nodejs-private/http-parser-private#1
    Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Evan Lucas <evanlucas@me.com>
    Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
    Reviewed-By: Rod Vagg <rod@vagg.org>
  14. deps: upgrade http-parser to v2.8.0

    bnoordhuis authored and MylesBorins committed Mar 27, 2018
    PR-URL: nodejs-private/http-parser-private#1
    Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Evan Lucas <evanlucas@me.com>
    Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
    Reviewed-By: Rod Vagg <rod@vagg.org>
Commits on Mar 7, 2018
  1. Working on v8.10.1

    gibfahn committed Mar 7, 2018
    PR-URL: nodejs#18336
Commits on Mar 6, 2018
  1. 2018-03-06 Version 8.10.0 'Carbon' (LTS)

    gibfahn committed Jan 24, 2018
    Notable changes:
    
    * deps:
      * update V8 to 6.2.414.46 (Michaël Zasso) [nodejs#16413](nodejs#16413)
      * revert ABI breaking changes in V8 6.2 (Anna Henningsen) [nodejs#16413](nodejs#16413)
      * upgrade libuv to 1.19.1 (cjihrig) [nodejs#18260](nodejs#18260)
      * re land npm 5.6.0 (Myles Borins) [nodejs#18625](nodejs#18625)
      * ICU 60 bump (Steven R. Loomis) [nodejs#16876](nodejs#16876)
    * crypto:
      * Support both OpenSSL 1.1.0 and 1.0.2 (David Benjamin) [nodejs#16130](nodejs#16130)
      * warn on invalid authentication tag length (Tobias Nießen) [nodejs#17566](nodejs#17566)
    * async_hooks:
      * update defaultTriggerAsyncIdScope for perf (Anatoli Papirovski) [nodejs#18004](nodejs#18004)
      * use typed array stack as fast path (Anna Henningsen) [nodejs#17780](nodejs#17780)
      * use scope for defaultTriggerAsyncId (Andreas Madsen) [nodejs#17273](nodejs#17273)
      * separate missing from default context (Andreas Madsen) [nodejs#17273](nodejs#17273)
      * rename initTriggerId (Andreas Madsen) [nodejs#17273](nodejs#17273)
      * deprecate undocumented API (Andreas Madsen) [nodejs#16972](nodejs#16972)
      * add destroy event for gced AsyncResources (Sebastian Mayr) [nodejs#16998](nodejs#16998)
      * add trace events to async_hooks (Andreas Madsen) [nodejs#15538](nodejs#15538)
      * set HTTPParser trigger to socket (Andreas Madsen) [nodejs#18003](nodejs#18003)
      * add provider types for net server (Andreas Madsen) [nodejs#17157](nodejs#17157)
    * n-api:
      * add helper for addons to get the event loop (Anna Henningsen) [nodejs#17109](nodejs#17109)
    * cli:
      * add --stack-trace-limit to NODE_OPTIONS (Anna Henningsen) [nodejs#16495](nodejs#16495)
    * console:
      * add support for console.debug (Benjamin Zaslavsky) [nodejs#17033](nodejs#17033)
    * module:
      * add builtinModules (Jon Moss) [nodejs#16386](nodejs#16386)
      * replace default paths in require.resolve() (cjihrig) [nodejs#17113](nodejs#17113)
    * src:
      * add helper for addons to get the event loop (Anna Henningsen) [nodejs#17109](nodejs#17109)
      * add process.ppid (cjihrig) [nodejs#16839](nodejs#16839)
    * http:
      * support generic `Duplex` streams (Anna Henningsen) [nodejs#16267](nodejs#16267)
      * add rawPacket in err of `clientError` event (XadillaX) [nodejs#17672](nodejs#17672)
      * better support for IPv6 addresses (Mattias Holmlund) [nodejs#14772](nodejs#14772)
    * net:
      * remove ADDRCONFIG DNS hint on Windows (Bartosz Sosnowski) [nodejs#17662](nodejs#17662)
    * process:
      * fix reading zero-length env vars on win32 (Anna Henningsen) [nodejs#18463](nodejs#18463)
    * tls:
      * unconsume stream on destroy (Anna Henningsen) [nodejs#17478](nodejs#17478)
    * process:
      * improve unhandled rejection message (Madara Uchiha) [nodejs#17158](nodejs#17158)
    * stream:
      * remove usage of *State.highWaterMark (Calvin Metcalf) [nodejs#12860](nodejs#12860)
    * trace_events:
      * add executionAsyncId to init events (Andreas Madsen) [nodejs#17196](nodejs#17196)
    
    PR-URL: nodejs#18336
Commits on Feb 27, 2018
  1. doc: add vdeturckheim as collaborator

    vdeturckheim authored and MylesBorins committed Jan 29, 2018
    PR-URL: nodejs#18432
    Reviewed-By: Anatoli Papirovski <apapirovski@mac.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Anna Henningsen <anna@addaleax.net>
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
    Reviewed-By: Tiancheng "Timothy" Gu <timothygu99@gmail.com>
  2. benchmark: implement duration in http test double

    joyeecheung authored and MylesBorins committed Jan 25, 2018
    PR-URL: nodejs#18380
    Reviewed-By: James M Snell <jasnell@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
  3. benchmark: make compare.R easier to understand

    AndreasMadsen authored and MylesBorins committed Jan 25, 2018
    PR-URL: nodejs#18373
    Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
    Reviewed-By: Ruben Bridgewater <ruben@bridgewater.de>
  4. fs: cleanup fd lchown and lchownSync

    jasnell authored and MylesBorins committed Jan 23, 2018
    lchown and lchownSync were opening file descriptors without
    closing them. Looks like it has been that way for 7 years.
    Does anyone actually use these functions?
    
    PR-URL: nodejs#18329
    Reviewed-By: Anna Henningsen <anna@addaleax.net>
    Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com>
    Reviewed-By: Evan Lucas <evanlucas@me.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
  5. doc: fix e.g., to e.g. in docs

    sreepurnajasti authored and MylesBorins committed Jan 25, 2018
    PR-URL: nodejs#18369
    Fixes: nodejs/code-and-learn#58
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
    Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Tobias Nießen <tniessen@tnie.de>
  6. doc: fix return value for require.resolve.paths()

    nephross authored and MylesBorins committed Jan 24, 2018
    Update documentation of modules.md for require.resolve.paths()
    to include the possibillity of null as a return value if
    the request string given matches a core module name.
    
    PR-URL: nodejs#18350
    Fixes: nodejs#18230
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
  7. doc: add missing word in modules.md

    paerallax authored and MylesBorins committed Jan 24, 2018
    PR-URL: nodejs#18343
    Reviewed-By: Gireesh Punathil <gpunathi@in.ibm.com>
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
    Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
  8. doc: add doc for performance.clearGC()

    antonyt authored and MylesBorins committed Jan 23, 2018
    PR-URL: nodejs#18331
    Reviewed-By: James M Snell <jasnell@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Khaidi Chu <i@2333.moe>
    Reviewed-By: Gireesh Punathil <gpunathi@in.ibm.com>
  9. doc: split CONTRIBUTING.md

    joyeecheung authored and MylesBorins committed Jan 20, 2018
    PR-URL: nodejs#18271
    Fixes: nodejs#17842
    Reviewed-By: Michaël Zasso <targos@protonmail.com>
    Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
    Reviewed-By: Gibson Fahnestock <gibfahn@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
  10. doc: fix typos in async_hooks

    ramesius authored and MylesBorins committed Jan 23, 2018
    PR-URL: nodejs#18314
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
  11. doc: add missing URL argument types in fs.md

    vsemozhetbyt authored and MylesBorins committed Jan 23, 2018
    PR-URL: nodejs#18309
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com>
  12. doc: remove confusing signature in fs.md

    vsemozhetbyt authored and MylesBorins committed Jan 23, 2018
    PR-URL: nodejs#18310
    Fixes: nodejs#18305
    Refs: nodejs#13424
    Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com>
    Reviewed-By: Gireesh Punathil <gpunathi@in.ibm.com>
    Reviewed-By: Richard Lau <riclau@uk.ibm.com>
  13. test: change assert message to default

    ryanmahan authored and MylesBorins committed Jan 19, 2018
    assert.strictEqual message argument removed to replace
    with default assert message to show the expected vs
    actual values
    
    PR-URL: nodejs#18259
    Refs: nodejs#13296
    Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
    Reviewed-By: Shingo Inoue <leko.noor@gmail.com>
    Reviewed-By: Jon Moss <me@jonathanmoss.me>
    Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
    Reviewed-By: James M Snell <jasnell@gmail.com>
  14. doc: use PBKDF2 in text

    tniessen authored and MylesBorins committed Jan 21, 2018
    Use upper case variant in text in compliance with RFC 2898.
    
    PR-URL: nodejs#18279
    Reviewed-By: Michaël Zasso <targos@protonmail.com>
    Reviewed-By: Vladimir Kurchatkin <vladimir.kurchatkin@gmail.com>
    Reviewed-By: Ruben Bridgewater <ruben@bridgewater.de>
  15. lib: fix typo in trace_events_async_hooks.js

    gillesdemey authored and MylesBorins committed Jan 21, 2018
    chrome://traceing does not exist
    
    PR-URL: nodejs#18280
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
    Reviewed-By: Jon Moss <me@jonathanmoss.me>
    Reviewed-By: Michaël Zasso <targos@protonmail.com>
  16. doc: fix typo in async_hooks.md

    ramesius authored and MylesBorins committed Jan 22, 2018
    Fix typo in `async_hooks.executionAsyncId()` explanation.
    
    PR-URL: nodejs#18286
    Reviewed-By: Michaël Zasso <targos@protonmail.com>
    Reviewed-By: Minwoo Jung <minwoo@nodesource.com>
    Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>