Skip to content

Commit 0722b0d

Browse files
nschonniTrott
authored andcommitted
fix: remark-lint-table-cell-padding
Also resolves remark-lint-table-pipes
1 parent 5a4c0b5 commit 0722b0d

5 files changed

Lines changed: 61 additions & 63 deletions

File tree

.remarkrc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@
1111
["remark-lint-no-trailing-spaces", false],
1212
["remark-lint-no-undefined-references", false],
1313
["remark-lint-no-unused-definitions", false],
14-
["remark-lint-prohibited-strings", false],
15-
["remark-lint-table-cell-padding", false],
16-
["remark-lint-table-pipes", false]
14+
["remark-lint-prohibited-strings", false]
1715
]
1816
}

locale/en/blog/release/v0.6.0.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,23 +22,23 @@ The major differences between v0.4 and v0.6 are
2222

2323
In order to support Windows we reworked much of the core architecture. There was some fear that our work would degrade performance on UNIX systems but this was not the case. Here is a Linux system we benched for demonstration:
2424

25-
||v0.4.12 (linux)|v0.6.0 (linux)|
26-
|--- |--- |--- |
27-
|http_simple.js /bytes/1024|5461 r/s|6263 r/s|
28-
|io.js read|19.75 mB/s|26.63 mB/s|
29-
|io.js write|21.60 mB/s|17.40 mB/s|
30-
|startup.js|74.7 ms|49.6 ms|
25+
| | v0.4.12 (linux) | v0.6.0 (linux) |
26+
|----------------------------|-----------------|----------------|
27+
| http_simple.js /bytes/1024 | 5461 r/s | 6263 r/s |
28+
| io.js read | 19.75 mB/s | 26.63 mB/s |
29+
| io.js write | 21.60 mB/s | 17.40 mB/s |
30+
| startup.js | 74.7 ms | 49.6 ms |
3131

3232
Bigger is better in http and io benchmarks, smaller is better in startup. The http benchmark was done with 600 clients on a 10GE network served from three load generation machines.
3333

3434
In the last version of Node, v0.4, we could only run Node on Windows with Cygwin. Therefore we've gotten massive improvements by targeting the native APIs. Benchmarks on the same machine:
3535

36-
||v0.4.12 (windows)|v0.6.0 (windows)|
37-
|--- |--- |--- |
38-
|http_simple.js /bytes/1024|3858 r/s|5823 r/s|
39-
|io.js read|12.41 mB/s|26.51 mB/s|
40-
|io.js write|12.61 mB/s|33.58 mB/s|
41-
|startup.js|152.81 ms|52.04 ms|
36+
| | v0.4.12 (windows) | v0.6.0 (windows) |
37+
|----------------------------|-------------------|------------------|
38+
| http_simple.js /bytes/1024 | 3858 r/s | 5823 r/s |
39+
| io.js read | 12.41 mB/s | 26.51 mB/s |
40+
| io.js write | 12.61 mB/s | 33.58 mB/s |
41+
| startup.js | 152.81 ms | 52.04 ms |
4242

4343
We consider this a good intermediate stage for the Windows port. There is still work to be done. For example, we are not yet providing users with a blessed path for building addon modules in MS Visual Studio. Work will continue in later releases.
4444

locale/en/blog/vulnerability/cve-2015-8027_cve-2015-6764.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -27,18 +27,18 @@ Full details of this vulnerability are embargoed until new releases are availabl
2727

2828
Common Vulnerability Scoring System (CVSS) v3 Base Score:
2929

30-
| Metric | Score |
31-
|-----------------------------|----------------------------|
32-
| **Base Score:** | **7.5 (High)** |
33-
| **Base Vector:** | [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
34-
| **Attack Vector:** | Network (AV:N) |
35-
| **Attack Complexity:** | Low (AC:L) |
36-
| **Privileges Required:** | None (PR:N) |
37-
| **User Interaction:** | None (UI:N) |
38-
| **Scope of Impact:** | Unchanged (S:U) |
39-
| **Confidentiality Impact:** | None (C:N) |
40-
| **Integrity Impact:** | None (I:N) |
41-
| **Availability Impact:** | High (A:H) |
30+
| Metric | Score |
31+
|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------|
32+
| **Base Score:** | **7.5 (High)** |
33+
| **Base Vector:** | [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) |
34+
| **Attack Vector:** | Network (AV:N) |
35+
| **Attack Complexity:** | Low (AC:L) |
36+
| **Privileges Required:** | None (PR:N) |
37+
| **User Interaction:** | None (UI:N) |
38+
| **Scope of Impact:** | Unchanged (S:U) |
39+
| **Confidentiality Impact:** | None (C:N) |
40+
| **Integrity Impact:** | None (I:N) |
41+
| **Availability Impact:** | High (A:H) |
4242

4343
Complete CVSS v3 Vector: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:R/CR:L/IR:L/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:R/CR:L/IR:L/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H). Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components.
4444

@@ -59,18 +59,18 @@ Full details of this vulnerability are embargoed until new releases are availabl
5959

6060
Common Vulnerability Scoring System (CVSS) v3 Base Score:
6161

62-
| Metric | Score |
63-
|-----------------------------|----------------------------|
64-
| **Base Score:** | **4.4 (Medium)** |
65-
| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)
66-
| **Attack Vector:** | Network (AV:N) |
67-
| **Attack Complexity:** | Medium (AC:H) |
68-
| **Privileges Required:** | High (PR:H) |
69-
| **User Interaction:** | None (UI:N) |
70-
| **Scope of Impact:** | Unchanged (S:U) |
71-
| **Confidentiality Impact:** | None (C:N) |
72-
| **Integrity Impact:** | None (I:N) |
73-
| **Availability Impact:** | High (A:H) |
62+
| Metric | Score |
63+
|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------|
64+
| **Base Score:** | **4.4 (Medium)** |
65+
| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) |
66+
| **Attack Vector:** | Network (AV:N) |
67+
| **Attack Complexity:** | Medium (AC:H) |
68+
| **Privileges Required:** | High (PR:H) |
69+
| **User Interaction:** | None (UI:N) |
70+
| **Scope of Impact:** | Unchanged (S:U) |
71+
| **Confidentiality Impact:** | None (C:N) |
72+
| **Integrity Impact:** | None (I:N) |
73+
| **Availability Impact:** | High (A:H) |
7474

7575
Complete CVSS v3 Vector: [CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:R/CR:L/IR:L/AR:M/MAV:N/MAC:H/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:R/CR:L/IR:L/AR:M/MAV:N/MAC:H/MPR:N/MUI:N/MS:U/MC:N/MI:N/MA:H). Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components.
7676

locale/en/blog/vulnerability/june-2016-security-releases.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -91,18 +91,18 @@ We will be including fixes relating to Node.js HTTP processing. We categorise th
9191

9292
Common Vulnerability Scoring System (CVSS) v3 Base Score:
9393

94-
| Metric | Score |
95-
|-----------------------------|----------------------------|
96-
| **Base Score:** | 4.8 (Medium) |
97-
| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
98-
| **Attack Vector:** | Network (AV:N) |
99-
| **Attack Complexity:** | High (AC:H) |
100-
| **Privileges Required:** | None (PR:N) |
101-
| **User Interaction:** | None (UI:N) |
102-
| **Scope of Impact:** | Unchanged (S:U) |
103-
| **Confidentiality Impact:** | Low (C:L) |
104-
| **Integrity Impact:** | Low (I:L) |
105-
| **Availability Impact:** | None (A:N) |
94+
| Metric | Score |
95+
|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------|
96+
| **Base Score:** | 4.8 (Medium) |
97+
| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) |
98+
| **Attack Vector:** | Network (AV:N) |
99+
| **Attack Complexity:** | High (AC:H) |
100+
| **Privileges Required:** | None (PR:N) |
101+
| **User Interaction:** | None (UI:N) |
102+
| **Scope of Impact:** | Unchanged (S:U) |
103+
| **Confidentiality Impact:** | Low (C:L) |
104+
| **Integrity Impact:** | Low (I:L) |
105+
| **Availability Impact:** | None (A:N) |
106106

107107
Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components.
108108

locale/en/blog/vulnerability/openssl-and-low-severity-fixes-jan-2016.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -29,18 +29,18 @@ In addition, we have some fixes to release relating to Node.js HTTP processing.
2929

3030
Common Vulnerability Scoring System (CVSS) v3 Base Score:
3131

32-
| Metric | Score |
33-
|-----------------------------|----------------------------|
34-
| **Base Score:** | **4.8 (Medium)** |
35-
| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
36-
| **Attack Vector:** | Network (AV:N) |
37-
| **Attack Complexity:** | High (AC:H) |
38-
| **Privileges Required:** | None (PR:N) |
39-
| **User Interaction:** | None (UI:N) |
40-
| **Scope of Impact:** | Unchanged (S:U) |
41-
| **Confidentiality Impact:** | Low (C:L) |
42-
| **Integrity Impact:** | Low (I:L) |
43-
| **Availability Impact:** | None (A:N) |
32+
| Metric | Score |
33+
|-----------------------------|----------------------------------------------------------------------------------------------------------------------------------------|
34+
| **Base Score:** | **4.8 (Medium)** |
35+
| **Base Vector:** | [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) |
36+
| **Attack Vector:** | Network (AV:N) |
37+
| **Attack Complexity:** | High (AC:H) |
38+
| **Privileges Required:** | None (PR:N) |
39+
| **User Interaction:** | None (UI:N) |
40+
| **Scope of Impact:** | Unchanged (S:U) |
41+
| **Confidentiality Impact:** | Low (C:L) |
42+
| **Integrity Impact:** | Low (I:L) |
43+
| **Availability Impact:** | None (A:N) |
4444

4545
Refer to the [CVSS v3 Specification](https://www.first.org/cvss/specification-document) for details on the meanings and application of the vector components.
4646

0 commit comments

Comments
 (0)