@@ -171,7 +171,7 @@ function onhandshakedone() {
171171function loadSession ( hello ) {
172172 debug ( 'server onclienthello' ,
173173 'sessionid.len' , hello . sessionId . length ,
174- 'ticket?' , hello . tlsTicket
174+ 'ticket?' , hello . tlsTicket ,
175175 ) ;
176176 const owner = this [ owner_symbol ] ;
177177
@@ -350,7 +350,7 @@ function onPskServerCallback(identity, maxPskLen) {
350350 throw new ERR_INVALID_ARG_TYPE (
351351 'ret' ,
352352 [ 'Object' , 'Buffer' , 'TypedArray' , 'DataView' ] ,
353- ret
353+ ret ,
354354 ) ;
355355 }
356356 psk = ret . psk ;
@@ -361,7 +361,7 @@ function onPskServerCallback(identity, maxPskLen) {
361361 throw new ERR_INVALID_ARG_VALUE (
362362 'psk' ,
363363 psk ,
364- `Pre-shared key exceeds ${ maxPskLen } bytes`
364+ `Pre-shared key exceeds ${ maxPskLen } bytes` ,
365365 ) ;
366366 }
367367
@@ -381,7 +381,7 @@ function onPskClientCallback(hint, maxPskLen, maxIdentityLen) {
381381 throw new ERR_INVALID_ARG_VALUE (
382382 'psk' ,
383383 ret . psk ,
384- `Pre-shared key exceeds ${ maxPskLen } bytes`
384+ `Pre-shared key exceeds ${ maxPskLen } bytes` ,
385385 ) ;
386386 }
387387
@@ -390,7 +390,7 @@ function onPskClientCallback(hint, maxPskLen, maxIdentityLen) {
390390 throw new ERR_INVALID_ARG_VALUE (
391391 'identity' ,
392392 ret . identity ,
393- `PSK identity exceeds ${ maxIdentityLen } bytes`
393+ `PSK identity exceeds ${ maxIdentityLen } bytes` ,
394394 ) ;
395395 }
396396
@@ -447,7 +447,7 @@ function initRead(tlsSocket, socket) {
447447 debug ( '%s initRead' ,
448448 tlsSocket . _tlsOptions . isServer ? 'server' : 'client' ,
449449 'handle?' , ! ! tlsSocket . _handle ,
450- 'buffered?' , ! ! socket && socket . readableLength
450+ 'buffered?' , ! ! socket && socket . readableLength ,
451451 ) ;
452452 // If we were destroyed already don't bother reading
453453 if ( ! tlsSocket . _handle )
@@ -689,7 +689,7 @@ TLSSocket.prototype._init = function(socket, wrap) {
689689
690690 debug ( '%s _init' ,
691691 options . isServer ? 'server' : 'client' ,
692- 'handle?' , ! ! ssl
692+ 'handle?' , ! ! ssl ,
693693 ) ;
694694
695695 // Clients (!isServer) always request a cert, servers request a client cert
@@ -846,7 +846,7 @@ TLSSocket.prototype.renegotiate = function(options, callback) {
846846
847847 debug ( '%s renegotiate()' ,
848848 this . _tlsOptions . isServer ? 'server' : 'client' ,
849- 'destroyed?' , this . destroyed
849+ 'destroyed?' , this . destroyed ,
850850 ) ;
851851
852852 if ( this . destroyed )
@@ -1456,7 +1456,7 @@ Server.prototype.addContext = function(servername, context) {
14561456
14571457 const re = new RegExp ( '^' + StringPrototypeReplaceAll (
14581458 RegExpPrototypeSymbolReplace ( / ( [ . ^ $ + ? \- \\ [ \] { } ] ) / g, servername , '\\$1' ) ,
1459- '*' , '[^.]*'
1459+ '*' , '[^.]*' ,
14601460 ) + '$' ) ;
14611461 ArrayPrototypePush ( this . _contexts ,
14621462 [ re , tls . createSecureContext ( context ) . context ] ) ;
@@ -1680,7 +1680,7 @@ exports.connect = function connect(...args) {
16801680 'Setting the TLS ServerName to an IP address is not permitted by ' +
16811681 'RFC 6066. This will be ignored in a future version.' ,
16821682 'DeprecationWarning' ,
1683- 'DEP0123'
1683+ 'DEP0123' ,
16841684 ) ;
16851685 ipServernameWarned = true ;
16861686 }
0 commit comments