tls: add trailing commas in source files

PR-URL: https://github.com/nodejs/node/pull/46715
Reviewed-By: Debadree Chatterjee <debadree333@gmail.com>
Reviewed-By: Darshan Sen <raisinten@gmail.com>
Reviewed-By: Moshe Atlow <moshe@atlow.co.il>
This commit is contained in:
Antoine du Hamel 2023-02-22 01:22:23 +01:00 committed by GitHub
parent ff89399506
commit f33ae81d84
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 9 additions and 8 deletions

View File

@ -299,7 +299,7 @@ overrides:
- ./internal/structured_clone.js
- ./internal/test/*.js
- ./internal/test_runner/**/*.js
- ./internal/tls/secure-context.js
- ./internal/tls/*.js
- ./internal/util/parse_args/*.js
- ./internal/v8_prof_processor.js
- ./internal/vm.js
@ -313,6 +313,7 @@ overrides:
- ./stream/*.js
- ./sys.js
- ./test.js
- ./tls.js
- ./url.js
- ./util/*.js
rules:

View File

@ -79,7 +79,7 @@ const {
ERR_TLS_REQUIRED_SERVER_NAME,
ERR_TLS_SESSION_ATTACK,
ERR_TLS_SNI_FROM_SERVER,
ERR_TLS_INVALID_STATE
ERR_TLS_INVALID_STATE,
} = codes;
const { onpskexchange: kOnPskExchange } = internalBinding('symbols');
const {
@ -97,7 +97,7 @@ const {
validateUint32,
} = require('internal/validators');
const {
InternalX509Certificate
InternalX509Certificate,
} = require('internal/crypto/x509');
const traceTls = getOptionValue('--trace-tls');
const tlsKeylog = getOptionValue('--tls-keylog');
@ -653,7 +653,7 @@ function defineHandleReading(socket, handle) {
},
set: (value) => {
socket[kRes].reading = value;
}
},
});
}
@ -1379,7 +1379,7 @@ Server.prototype.setSecureContext = function(options) {
Server.prototype._getServerData = function() {
return {
ticketKeys: this.getTicketKeys().toString('hex')
ticketKeys: this.getTicketKeys().toString('hex'),
};
};
@ -1615,7 +1615,7 @@ exports.connect = function connect(...args) {
ciphers: tls.DEFAULT_CIPHERS,
checkServerIdentity: tls.checkServerIdentity,
minDHSize: 1024,
...options
...options,
};
if (!options.keepAlive)

View File

@ -71,7 +71,7 @@ class SecurePair extends EventEmitter {
isServer,
requestCert,
rejectUnauthorized,
...options
...options,
});
this.cleartext.once('secure', () => this.emit('secure'));
}

View File

@ -49,7 +49,7 @@ const {
const {
ERR_TLS_CERT_ALTNAME_FORMAT,
ERR_TLS_CERT_ALTNAME_INVALID,
ERR_OUT_OF_RANGE
ERR_OUT_OF_RANGE,
} = require('internal/errors').codes;
const internalUtil = require('internal/util');
internalUtil.assertCrypto();