Skip to content

Commit cd4efb4

Browse files
committed
chore: format code
1 parent e9a8cbf commit cd4efb4

File tree

5 files changed

+20
-12
lines changed

5 files changed

+20
-12
lines changed

Cargo.lock

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "fastcert"
3-
version = "0.2.0"
3+
version = "0.3.0"
44
edition = "2024"
55
description = "A simple zero-config tool for making locally-trusted development certificates"
66
license = "BSD-3-Clause"

tests/ca_tests.rs

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,10 @@ fn test_ca_directory_creation() {
108108

109109
let mut ca = fastcert::ca::CertificateAuthority::new(ca_dir.clone());
110110
let result = ca.load_or_create();
111-
assert!(result.is_ok(), "Should create directory if it doesn't exist");
111+
assert!(
112+
result.is_ok(),
113+
"Should create directory if it doesn't exist"
114+
);
112115
assert!(ca_dir.exists(), "CA directory should be created");
113116

114117
unsafe {
@@ -150,7 +153,10 @@ fn test_ca_generates_unique_serials() {
150153
let cert_pem = fs::read_to_string(&cert_file).unwrap();
151154

152155
// Extract serial from certificate (simplified check - just ensure content differs)
153-
assert!(serials.insert(cert_pem.clone()), "Certificates should differ");
156+
assert!(
157+
serials.insert(cert_pem.clone()),
158+
"Certificates should differ"
159+
);
154160
}
155161

156162
unsafe {
@@ -217,7 +223,10 @@ fn test_multiple_ca_roots() {
217223
// Verify they're different
218224
let ca1_pem = fs::read_to_string(temp_dir1.path().join("rootCA.pem")).unwrap();
219225
let ca2_pem = fs::read_to_string(temp_dir2.path().join("rootCA.pem")).unwrap();
220-
assert_ne!(ca1_pem, ca2_pem, "Different CAs should have different certs");
226+
assert_ne!(
227+
ca1_pem, ca2_pem,
228+
"Different CAs should have different certs"
229+
);
221230

222231
unsafe {
223232
env::remove_var("CAROOT");

tests/error_handling.rs

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -300,10 +300,7 @@ fn test_serial_number_uniqueness() {
300300
// Generate 100 serial numbers
301301
for _ in 0..100 {
302302
let serial = generate_serial_number();
303-
assert!(
304-
serials.insert(serial),
305-
"Serial numbers should be unique"
306-
);
303+
assert!(serials.insert(serial), "Serial numbers should be unique");
307304
}
308305

309306
assert_eq!(serials.len(), 100, "Should have 100 unique serials");

tests/validation_tests.rs

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,10 @@ fn test_create_cert_params_multiple() {
207207
"127.0.0.1".to_string(),
208208
];
209209
let result = fastcert::cert::create_cert_params(&hosts);
210-
assert!(result.is_ok(), "Should create cert params for multiple hosts");
210+
assert!(
211+
result.is_ok(),
212+
"Should create cert params for multiple hosts"
213+
);
211214
}
212215

213216
#[test]
@@ -275,8 +278,7 @@ fn test_cert_chain_validation() {
275278
let ca_parsed = pem::parse(&ca_pem).unwrap();
276279

277280
// Validate chain
278-
let result =
279-
fastcert::cert::validate_cert_chain(cert_parsed.contents(), ca_parsed.contents());
281+
let result = fastcert::cert::validate_cert_chain(cert_parsed.contents(), ca_parsed.contents());
280282
assert!(result.is_ok(), "Certificate chain should be valid");
281283

282284
unsafe {

0 commit comments

Comments
 (0)