@@ -287,7 +287,7 @@ mod tests {
287287 fn test_process_negotiation_response_with_all_evidence_types ( ) {
288288 let result = process_negotiation_response ( VALID_RESPONSE_BODY ) ;
289289 assert ! ( result. is_ok( ) , "Parsing a valid response should succeed" ) ;
290- let evidence_requests = result. unwrap ( ) ;
290+ let evidence_requests = result. unwrap ( ) ; //#[allow_ci]
291291
292292 assert_eq ! ( evidence_requests. len( ) , 3 ) ;
293293
@@ -303,20 +303,20 @@ mod tests {
303303 assert_eq ! ( signature_scheme, "rsassa" ) ;
304304 assert_eq ! ( hash_algorithm, "sha384" ) ;
305305 let empty_sha1: Vec < u32 > = vec ! [ ] ;
306- assert_eq ! ( selected_subjects. get( "sha1" ) . unwrap( ) , & empty_sha1) ;
306+ assert_eq ! ( selected_subjects. get( "sha1" ) . unwrap( ) , & empty_sha1) ; //#[allow_ci]
307307 assert_eq ! (
308- selected_subjects. get( "sha256" ) . unwrap( ) ,
308+ selected_subjects. get( "sha256" ) . unwrap( ) , //#[allow_ci]
309309 & vec![ 0 , 1 , 2 , 3 , 4 , 5 , 6 ]
310310 ) ;
311311 } else {
312- panic ! ( "Expected TpmQuote request" ) ;
312+ panic ! ( "Expected TpmQuote request" ) ; //#[allow_ci]
313313 }
314314
315315 // Check UefiLog request
316316 if let EvidenceRequest :: UefiLog { .. } = & evidence_requests[ 1 ] {
317317 // UefiLog request found
318318 } else {
319- panic ! ( "Expected UefiLog request" ) ;
319+ panic ! ( "Expected UefiLog request" ) ; //#[allow_ci]
320320 }
321321
322322 // Check ImaLog request
@@ -329,7 +329,7 @@ mod tests {
329329 assert_eq ! ( * starting_offset, Some ( 3925 ) ) ;
330330 assert_eq ! ( * entry_count, Some ( 100 ) ) ;
331331 } else {
332- panic ! ( "Expected ImaLog request" ) ;
332+ panic ! ( "Expected ImaLog request" ) ; //#[allow_ci]
333333 }
334334 }
335335
@@ -338,7 +338,7 @@ mod tests {
338338 // Test with only TPM quote - should succeed
339339 let result = process_negotiation_response ( RESPONSE_ONLY_TPM_QUOTE ) ;
340340 assert ! ( result. is_ok( ) ) ;
341- let evidence_requests = result. unwrap ( ) ;
341+ let evidence_requests = result. unwrap ( ) ; //#[allow_ci]
342342 assert_eq ! ( evidence_requests. len( ) , 1 ) ;
343343 assert ! ( matches!(
344344 evidence_requests[ 0 ] ,
@@ -348,7 +348,7 @@ mod tests {
348348 // Test with only IMA log - should succeed
349349 let result = process_negotiation_response ( RESPONSE_ONLY_IMA_LOG ) ;
350350 assert ! ( result. is_ok( ) ) ;
351- let evidence_requests = result. unwrap ( ) ;
351+ let evidence_requests = result. unwrap ( ) ; //#[allow_ci]
352352 assert_eq ! ( evidence_requests. len( ) , 1 ) ;
353353 assert ! ( matches!(
354354 evidence_requests[ 0 ] ,
@@ -358,7 +358,7 @@ mod tests {
358358 // Test with only UEFI log - should succeed
359359 let result = process_negotiation_response ( RESPONSE_ONLY_UEFI_LOG ) ;
360360 assert ! ( result. is_ok( ) ) ;
361- let evidence_requests = result. unwrap ( ) ;
361+ let evidence_requests = result. unwrap ( ) ; //#[allow_ci]
362362 assert_eq ! ( evidence_requests. len( ) , 1 ) ;
363363 assert ! ( matches!(
364364 evidence_requests[ 0 ] ,
@@ -390,7 +390,7 @@ mod tests {
390390 fn test_set_evidence_log_paths ( ) {
391391 let result = process_negotiation_response ( VALID_RESPONSE_BODY ) ;
392392 assert ! ( result. is_ok( ) ) ;
393- let mut evidence_requests = result. unwrap ( ) ;
393+ let mut evidence_requests = result. unwrap ( ) ; //#[allow_ci]
394394
395395 // Initially, log paths should be None
396396 for request in & evidence_requests {
@@ -417,13 +417,13 @@ mod tests {
417417 match request {
418418 EvidenceRequest :: ImaLog { log_path, .. } => {
419419 assert_eq ! (
420- log_path. as_ref( ) . unwrap( ) ,
420+ log_path. as_ref( ) . unwrap( ) , //#[allow_ci]
421421 "/path/to/ima.log"
422422 ) ;
423423 }
424424 EvidenceRequest :: UefiLog { log_path, .. } => {
425425 assert_eq ! (
426- log_path. as_ref( ) . unwrap( ) ,
426+ log_path. as_ref( ) . unwrap( ) , //#[allow_ci]
427427 "/path/to/uefi.log"
428428 ) ;
429429 }
@@ -441,7 +441,7 @@ mod tests {
441441 ) ;
442442
443443 assert ! ( evidence_requests. is_ok( ) ) ;
444- let requests = evidence_requests. unwrap ( ) ;
444+ let requests = evidence_requests. unwrap ( ) ; //#[allow_ci]
445445 assert_eq ! ( requests. len( ) , 3 ) ;
446446
447447 // Verify the TPM quote request
@@ -456,14 +456,14 @@ mod tests {
456456 assert_eq ! ( signature_scheme, "rsassa" ) ;
457457 assert_eq ! ( hash_algorithm, "sha384" ) ;
458458 } else {
459- panic ! ( "Expected first request to be TPM quote" ) ;
459+ panic ! ( "Expected first request to be TPM quote" ) ; //#[allow_ci]
460460 }
461461
462462 // Verify the UEFI log request has the path set
463463 if let EvidenceRequest :: UefiLog { log_path, .. } = & requests[ 1 ] {
464- assert_eq ! ( log_path. as_ref( ) . unwrap( ) , "/path/to/uefi.log" ) ;
464+ assert_eq ! ( log_path. as_ref( ) . unwrap( ) , "/path/to/uefi.log" ) ; //#[allow_ci]
465465 } else {
466- panic ! ( "Expected second request to be UEFI log" ) ;
466+ panic ! ( "Expected second request to be UEFI log" ) ; //#[allow_ci]
467467 }
468468
469469 // Verify the IMA log request has the path set
@@ -473,10 +473,10 @@ mod tests {
473473 ..
474474 } = & requests[ 2 ]
475475 {
476- assert_eq ! ( log_path. as_ref( ) . unwrap( ) , "/path/to/ima.log" ) ;
476+ assert_eq ! ( log_path. as_ref( ) . unwrap( ) , "/path/to/ima.log" ) ; //#[allow_ci]
477477 assert_eq ! ( * starting_offset, Some ( 3925 ) ) ;
478478 } else {
479- panic ! ( "Expected third request to be IMA log" ) ;
479+ panic ! ( "Expected third request to be IMA log" ) ; //#[allow_ci]
480480 }
481481 }
482482}
0 commit comments