@@ -233,7 +233,10 @@ mod tests {
233233
234234 #[ test]
235235 fn minimal_certificate ( ) {
236- let ca = get_ecdsa_ca ( ) ;
236+ let ca = CertificateAuthorityBuilder :: < ecdsa:: SigningKey > :: builder ( )
237+ . build ( )
238+ . expect ( "failed to build CA" ) ;
239+
237240 let certificate = CertificateBuilder :: builder ( )
238241 . subject ( "CN=trino-coordinator-default-0" )
239242 . signed_by ( & ca)
@@ -251,11 +254,15 @@ mod tests {
251254
252255 #[ test]
253256 fn customized_certificate ( ) {
254- let ca = get_rsa_ca ( ) ;
257+ let ca = CertificateAuthorityBuilder :: builder ( )
258+ . build ( )
259+ . expect ( "failed to build CA" ) ;
260+
255261 let sans = [
256262 "trino-coordinator-default-0.trino-coordinator-default.default.svc.cluster-local" ,
257263 "trino-coordinator-default.default.svc.cluster-local" ,
258264 ] ;
265+
259266 let certificate = CertificateBuilder :: builder ( )
260267 . subject ( "CN=trino-coordinator-default-0" )
261268 . subject_alterative_dns_names ( & sans)
@@ -320,16 +327,4 @@ mod tests {
320327 assert_ne ! ( certificate. serial_number, SerialNumber :: from( 0_u64 ) )
321328 }
322329 }
323-
324- fn get_ecdsa_ca ( ) -> CertificateAuthority < ecdsa:: SigningKey > {
325- CertificateAuthorityBuilder :: builder ( )
326- . build ( )
327- . expect ( "failed to build CA" )
328- }
329-
330- fn get_rsa_ca ( ) -> CertificateAuthority < rsa:: SigningKey > {
331- CertificateAuthorityBuilder :: builder ( )
332- . build ( )
333- . expect ( "failed to build CA" )
334- }
335330}
0 commit comments