@@ -37,15 +37,15 @@ function prepareMainThreadExecution(expandArgv1 = false, initializeModules = tru
3737prepareExecution ( {
3838 expandArgv1,
3939 initializeModules,
40- isMainThread : true
40+ isMainThread : true ,
4141} ) ;
4242}
4343
4444function prepareWorkerThreadExecution ( ) {
4545prepareExecution ( {
4646expandArgv1 : false ,
4747initializeModules : false , // Will need to initialize it after policy setup
48- isMainThread : false
48+ isMainThread : false ,
4949} ) ;
5050}
5151
@@ -135,7 +135,7 @@ function patchProcessObject(expandArgv1){
135135enumerable : true ,
136136// Only set it to true during snapshot building.
137137configurable : getOptionValue ( '--build-snapshot' ) ,
138- value : process . argv [ 0 ]
138+ value : process . argv [ 0 ] ,
139139} ) ;
140140
141141process . exitCode = undefined ;
@@ -184,15 +184,15 @@ function addReadOnlyProcessAlias(name, option, enumerable = true){
184184writable : false ,
185185configurable : true ,
186186 enumerable,
187- value
187+ value,
188188} ) ;
189189}
190190}
191191
192192function setupWarningHandler ( ) {
193193const {
194194 onWarning,
195- resetForSerialization
195+ resetForSerialization,
196196} = require ( 'internal/process/warning' ) ;
197197if ( getOptionValue ( '--warnings' ) &&
198198process . env . NODE_NO_WARNINGS !== '1' ) {
@@ -241,7 +241,7 @@ function setupFetch(){
241241} ,
242242set ( value ) {
243243exposeInterface ( globalThis , name , value ) ;
244- }
244+ } ,
245245} ;
246246}
247247
@@ -271,7 +271,7 @@ function setupWebCrypto(){
271271get crypto ( ) {
272272webcrypto ??= require ( 'internal/crypto/webcrypto' ) ;
273273return webcrypto . crypto ;
274- }
274+ } ,
275275} , 'crypto' ) } ) ;
276276if ( internalBinding ( 'config' ) . hasOpenSSL ) {
277277webcrypto ??= require ( 'internal/crypto/webcrypto' ) ;
@@ -323,7 +323,7 @@ function initializeReport(){
323323configurable : true ,
324324get ( ) {
325325return report ;
326- }
326+ } ,
327327} ) ;
328328}
329329
@@ -384,7 +384,7 @@ function setupInspectorHooks(){
384384if ( internalBinding ( 'config' ) . hasInspector ) {
385385const {
386386 enable,
387- disable
387+ disable,
388388} = require ( 'internal/inspector_async_hook' ) ;
389389internalBinding ( 'inspector' ) . registerAsyncHook ( enable , disable ) ;
390390}
@@ -439,7 +439,7 @@ function initializeDeprecations(){
439439writable : false ,
440440enumerable : true ,
441441configurable : true ,
442- value : noBrowserGlobals
442+ value : noBrowserGlobals ,
443443} ) ;
444444}
445445
@@ -510,7 +510,7 @@ function readPolicyFromDisk(){
510510for ( let i = 0 ; i < integrityEntries . length ; i ++ ) {
511511const {
512512 algorithm,
513- value : expected
513+ value : expected ,
514514} = integrityEntries [ i ] ;
515515const hash = createHash ( algorithm ) ;
516516hash . update ( src ) ;
@@ -527,7 +527,7 @@ function readPolicyFromDisk(){
527527}
528528}
529529return {
530- manifestSrc : src , manifestURL : manifestURL . href
530+ manifestSrc : src , manifestURL : manifestURL . href ,
531531} ;
532532}
533533}
@@ -557,7 +557,7 @@ function initializeESMLoader(){
557557
558558const {
559559 setImportModuleDynamicallyCallback,
560- setInitializeImportMetaObjectCallback
560+ setInitializeImportMetaObjectCallback,
561561} = internalBinding ( 'module_wrap' ) ;
562562const esm = require ( 'internal/process/esm_loader' ) ;
563563// Setup per-isolate callbacks that locate data or callbacks that we keep
@@ -600,7 +600,7 @@ function loadPreloadModules(){
600600if ( preloadModules && preloadModules . length > 0 ) {
601601const {
602602Module : {
603- _preloadModules
603+ _preloadModules,
604604} ,
605605} = require ( 'internal/modules/cjs/loader' ) ;
606606_preloadModules ( preloadModules ) ;
@@ -615,5 +615,5 @@ module.exports ={
615615 setupUserModules,
616616 prepareMainThreadExecution,
617617 prepareWorkerThreadExecution,
618- markBootstrapComplete
618+ markBootstrapComplete,
619619} ;
0 commit comments