Skip to content
Closed
Changes from 1 commit
Commits
Show all changes
33 commits
Select commit Hold shift + click to select a range
f05982b
doc: add supported platforms list
mhdawson Mar 17, 2017
76e903e
doc: add supported platforms list for v6.x
mhdawson Mar 20, 2017
6486b97
doc: fix broken URL to event loop guide
sushi90 Mar 3, 2017
078188d
stream: avoid additional validation for Buffers
mscdex Jan 2, 2017
daddf5a
tools, test: require const/let in test
gibfahn Jan 8, 2017
b2fc0f0
test: use eslint to fix var->const/let
gibfahn Mar 9, 2017
7e98f23
doc: fix stylistic issues in api/net.md
aqrln Mar 10, 2017
533e565
test: add arrow functions to test-util-inspect
aqrln Mar 10, 2017
0695c09
test: skip when openssl CLI doesn't exist
sotayamashita Feb 1, 2017
17963a5
build: --without-ssl implies --without-inspector
bnoordhuis Apr 4, 2017
3855504
doc: new TLSSocket has no secure context options
sam-github Dec 30, 2016
a6ab9f2
doc: clarify memory sharing behavior of buffer ctor
zbjornson Jan 13, 2017
b85d15f
test: improve test-fs-access
edsadr Jan 3, 2017
3cde69a
test: refactor test-beforeexit-event-exit.js
cjihrig Jan 2, 2017
a654502
test: s/assert.equal/assert.strictEqual/
gibfahn Jan 8, 2017
acd9bc3
assert, tools: enforce strict (not)equal in eslint
gibfahn Jan 8, 2017
42d1fb1
test: refactor test-stream2-readable-wrap.js
DavidGoussev Dec 31, 2016
f23c818
test: getgroups() may contain duplicate GIDs
sam-github Dec 21, 2016
c555f53
doc,test: tls .ca option supports multi-PEM files
sam-github Dec 21, 2016
54486c0
test: tls cert chain completion scenarios
sam-github Dec 20, 2016
b631966
doc: use correct tls certificate property name
sam-github Dec 20, 2016
cdc354a
test: check tls server verification with addCACert
sam-github Dec 20, 2016
b0daa9b
test: move common tls connect setup into fixtures
sam-github Dec 17, 2016
7b121f1
doc: make os api doc more consistent
evanlucas Jan 25, 2017
dcf20bc
doc: fix typo in STYLE_GUIDE.md
seishun Feb 28, 2017
7a6683e
doc: use common malformed instead of misformatted
jsumners Feb 23, 2017
de13d62
doc: add link to references in net.Socket
joyeecheung Mar 1, 2017
1427c0e
test: skip tests with common.skip
thefourtheye Feb 27, 2017
ea719a1
doc: fixup errors.md
vsemozhetbyt Feb 26, 2017
c60fd7f
net: remove misleading comment
bnoordhuis Feb 27, 2017
6765c88
src: make copies of startup environment variables
bnoordhuis Jan 28, 2017
0dc1d85
src: add SafeGetenv() to internal API
sam-github Jan 27, 2017
b89ea8a
crypto: support OPENSSL_CONF again
sam-github Jan 25, 2017
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
doc: new TLSSocket has no secure context options
Unlike all the other tls APIs, if any secure context configuration is
required, the caller is responsible for creating the context.

Corrects a doc regression introduced in caa7fa9.

PR-URL: #10545
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
Reviewed-By: Anna Henningsen <anna@addaleax.net>
  • Loading branch information
sam-github authored and MylesBorins committed Apr 13, 2017
commit 3855504f22a194ba40537dff05e35f6f3ed97a5a
8 changes: 2 additions & 6 deletions doc/api/tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -483,12 +483,8 @@ added: v0.11.4
will be emitted on the socket before establishing a secure communication
* `secureContext`: Optional TLS context object created with
[`tls.createSecureContext()`][]. If a `secureContext` is _not_ provided, one
will be created by passing the entire `options` object to
`tls.createSecureContext()`. *Note*: In effect, all
[`tls.createSecureContext()`][] options can be provided, but they will be
_completely ignored_ unless the `secureContext` option is missing.
* ...: Optional [`tls.createSecureContext()`][] options can be provided, see
the `secureContext` option for more information.
will be created by calling [`tls.createSecureContext()`][] with no options.

Construct a new `tls.TLSSocket` object from an existing TCP socket.

### Event: 'OCSPResponse'
Expand Down