@@ -79,7 +79,7 @@ const {
7979 ERR_TLS_REQUIRED_SERVER_NAME ,
8080 ERR_TLS_SESSION_ATTACK ,
8181 ERR_TLS_SNI_FROM_SERVER ,
82- ERR_TLS_INVALID_STATE
82+ ERR_TLS_INVALID_STATE ,
8383} = codes ;
8484const { onpskexchange : kOnPskExchange } = internalBinding ( 'symbols' ) ;
8585const {
@@ -97,7 +97,7 @@ const {
9797 validateUint32,
9898} = require ( 'internal/validators' ) ;
9999const {
100- InternalX509Certificate
100+ InternalX509Certificate,
101101} = require ( 'internal/crypto/x509' ) ;
102102const traceTls = getOptionValue ( '--trace-tls' ) ;
103103const tlsKeylog = getOptionValue ( '--tls-keylog' ) ;
@@ -653,7 +653,7 @@ function defineHandleReading(socket, handle) {
653653 } ,
654654 set : ( value ) => {
655655 socket [ kRes ] . reading = value ;
656- }
656+ } ,
657657 } ) ;
658658}
659659
@@ -1379,7 +1379,7 @@ Server.prototype.setSecureContext = function(options) {
13791379
13801380Server . prototype . _getServerData = function ( ) {
13811381 return {
1382- ticketKeys : this . getTicketKeys ( ) . toString ( 'hex' )
1382+ ticketKeys : this . getTicketKeys ( ) . toString ( 'hex' ) ,
13831383 } ;
13841384} ;
13851385
@@ -1615,7 +1615,7 @@ exports.connect = function connect(...args) {
16151615 ciphers : tls . DEFAULT_CIPHERS ,
16161616 checkServerIdentity : tls . checkServerIdentity ,
16171617 minDHSize : 1024 ,
1618- ...options
1618+ ...options ,
16191619 } ;
16201620
16211621 if ( ! options . keepAlive )
0 commit comments