tls: add trailing commas in source files

PR-URL: https://github.com/nodejs/node/pull/46715
Reviewed-By: Debadree Chatterjee <debadree333@gmail.com>
Reviewed-By: Darshan Sen <raisinten@gmail.com>
Reviewed-By: Moshe Atlow <moshe@atlow.co.il>
This commit is contained in:
Antoine du Hamel 2023-02-22 01:22:23 +01:00 committed by GitHub
parent ff89399506
commit f33ae81d84
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 9 additions and 8 deletions

View File

@ -299,7 +299,7 @@ overrides:
- ./internal/structured_clone.js - ./internal/structured_clone.js
- ./internal/test/*.js - ./internal/test/*.js
- ./internal/test_runner/**/*.js - ./internal/test_runner/**/*.js
- ./internal/tls/secure-context.js - ./internal/tls/*.js
- ./internal/util/parse_args/*.js - ./internal/util/parse_args/*.js
- ./internal/v8_prof_processor.js - ./internal/v8_prof_processor.js
- ./internal/vm.js - ./internal/vm.js
@ -313,6 +313,7 @@ overrides:
- ./stream/*.js - ./stream/*.js
- ./sys.js - ./sys.js
- ./test.js - ./test.js
- ./tls.js
- ./url.js - ./url.js
- ./util/*.js - ./util/*.js
rules: rules:

View File

@ -79,7 +79,7 @@ const {
ERR_TLS_REQUIRED_SERVER_NAME, ERR_TLS_REQUIRED_SERVER_NAME,
ERR_TLS_SESSION_ATTACK, ERR_TLS_SESSION_ATTACK,
ERR_TLS_SNI_FROM_SERVER, ERR_TLS_SNI_FROM_SERVER,
ERR_TLS_INVALID_STATE ERR_TLS_INVALID_STATE,
} = codes; } = codes;
const { onpskexchange: kOnPskExchange } = internalBinding('symbols'); const { onpskexchange: kOnPskExchange } = internalBinding('symbols');
const { const {
@ -97,7 +97,7 @@ const {
validateUint32, validateUint32,
} = require('internal/validators'); } = require('internal/validators');
const { const {
InternalX509Certificate InternalX509Certificate,
} = require('internal/crypto/x509'); } = require('internal/crypto/x509');
const traceTls = getOptionValue('--trace-tls'); const traceTls = getOptionValue('--trace-tls');
const tlsKeylog = getOptionValue('--tls-keylog'); const tlsKeylog = getOptionValue('--tls-keylog');
@ -653,7 +653,7 @@ function defineHandleReading(socket, handle) {
}, },
set: (value) => { set: (value) => {
socket[kRes].reading = value; socket[kRes].reading = value;
} },
}); });
} }
@ -1379,7 +1379,7 @@ Server.prototype.setSecureContext = function(options) {
Server.prototype._getServerData = function() { Server.prototype._getServerData = function() {
return { return {
ticketKeys: this.getTicketKeys().toString('hex') ticketKeys: this.getTicketKeys().toString('hex'),
}; };
}; };
@ -1615,7 +1615,7 @@ exports.connect = function connect(...args) {
ciphers: tls.DEFAULT_CIPHERS, ciphers: tls.DEFAULT_CIPHERS,
checkServerIdentity: tls.checkServerIdentity, checkServerIdentity: tls.checkServerIdentity,
minDHSize: 1024, minDHSize: 1024,
...options ...options,
}; };
if (!options.keepAlive) if (!options.keepAlive)

View File

@ -71,7 +71,7 @@ class SecurePair extends EventEmitter {
isServer, isServer,
requestCert, requestCert,
rejectUnauthorized, rejectUnauthorized,
...options ...options,
}); });
this.cleartext.once('secure', () => this.emit('secure')); this.cleartext.once('secure', () => this.emit('secure'));
} }

View File

@ -49,7 +49,7 @@ const {
const { const {
ERR_TLS_CERT_ALTNAME_FORMAT, ERR_TLS_CERT_ALTNAME_FORMAT,
ERR_TLS_CERT_ALTNAME_INVALID, ERR_TLS_CERT_ALTNAME_INVALID,
ERR_OUT_OF_RANGE ERR_OUT_OF_RANGE,
} = require('internal/errors').codes; } = require('internal/errors').codes;
const internalUtil = require('internal/util'); const internalUtil = require('internal/util');
internalUtil.assertCrypto(); internalUtil.assertCrypto();