Skip to content

Commit a151bc4

Browse files
committed
Group imports
Signed-off-by: Joshua Potts <[email protected]>
1 parent 957a3d8 commit a151bc4

File tree

12 files changed

+65
-47
lines changed

12 files changed

+65
-47
lines changed

.github/workflows/ci.yml

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,26 @@ env:
1313
RUSTFLAGS: -D warnings
1414

1515
jobs:
16+
fmt:
17+
name: Format (unstable)
18+
runs-on: ubuntu-latest
19+
steps:
20+
- name: Checkout sources
21+
uses: actions/checkout@v5
22+
with:
23+
persist-credentials: false
24+
- name: Install rust nightly toolchain
25+
uses: dtolnay/rust-toolchain@master
26+
with:
27+
toolchain: nightly
28+
components: rustfmt
29+
- name: Check formatting (unstable)
30+
run: cargo +nightly fmt -- --check
31+
- if: ${{ failure() }}
32+
run: echo "Nightly formatting check failed. Please run \`cargo +nightly fmt\`"
33+
1634
lint:
17-
name: Format & clippy
35+
name: Clippy
1836
runs-on: ubuntu-latest
1937
continue-on-error: true
2038
steps:
@@ -25,8 +43,7 @@ jobs:
2543
- name: Install rust toolchain
2644
uses: dtolnay/rust-toolchain@stable
2745
with:
28-
components: clippy, rustfmt
29-
- run: cargo fmt -- --check
46+
components: clippy
3047
# `fips` and `aws_lc_rs_unstable` cannot be used together, so avoid `--all-features`
3148
- run: cargo clippy --features ring,pem,x509-parser --all-targets
3249
# rustls-cert-gen require either aws_lc_rs or ring feature

.rustfmt.toml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,5 @@
11
hard_tabs = true
22
match_block_trailing_comma = true
3+
4+
unstable_features = true
5+
group_imports = "StdExternalCrate"

rcgen/examples/rsa-irc-openssl.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
#[cfg(unix)]
22
fn main() -> Result<(), Box<dyn std::error::Error>> {
3-
use rcgen::{date_time_ymd, CertificateParams, DistinguishedName};
43
use std::fmt::Write;
54
use std::fs;
65

6+
use rcgen::{date_time_ymd, CertificateParams, DistinguishedName};
7+
78
let mut params: CertificateParams = Default::default();
89
params.not_before = date_time_ymd(2021, 5, 19);
910
params.not_after = date_time_ymd(4096, 1, 1);

rcgen/examples/simple.rs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
1-
use rcgen::{date_time_ymd, CertificateParams, DistinguishedName, DnType, KeyPair, SanType};
21
use std::fs;
32

3+
use rcgen::{date_time_ymd, CertificateParams, DistinguishedName, DnType, KeyPair, SanType};
4+
45
fn main() -> Result<(), Box<dyn std::error::Error>> {
56
let mut params: CertificateParams = Default::default();
67
params.not_before = date_time_ymd(1975, 1, 1);

rcgen/src/csr.rs

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,9 +96,10 @@ impl CertificateSigningRequestParams {
9696
/// [`rustls_pemfile::csr()`]: https://docs.rs/rustls-pemfile/latest/rustls_pemfile/fn.csr.html
9797
#[cfg(feature = "x509-parser")]
9898
pub fn from_der(csr: &CertificateSigningRequestDer<'_>) -> Result<Self, Error> {
99-
use crate::KeyUsagePurpose;
10099
use x509_parser::prelude::FromDer;
101100

101+
use crate::KeyUsagePurpose;
102+
102103
let csr = x509_parser::certification_request::X509CertificationRequest::from_der(csr)
103104
.map_err(|_| Error::CouldNotParseCertificationRequest)?
104105
.1;
@@ -211,10 +212,11 @@ impl CertificateSigningRequestParams {
211212

212213
#[cfg(all(test, feature = "x509-parser"))]
213214
mod tests {
214-
use crate::{CertificateParams, ExtendedKeyUsagePurpose, KeyPair, KeyUsagePurpose};
215215
use x509_parser::certification_request::X509CertificationRequest;
216216
use x509_parser::prelude::{FromDer, ParsedExtension};
217217

218+
use crate::{CertificateParams, ExtendedKeyUsagePurpose, KeyPair, KeyUsagePurpose};
219+
218220
#[test]
219221
fn dont_write_sans_extension_if_no_sans_are_present() {
220222
let mut params = CertificateParams::default();

rcgen/src/key_pair.rs

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
#[cfg(feature = "crypto")]
22
use std::fmt;
33

4+
#[cfg(all(feature = "aws_lc_rs_unstable", not(feature = "fips")))]
5+
use aws_lc_rs::unstable::signature::PqdsaKeyPair;
46
#[cfg(feature = "pem")]
57
use pem::Pem;
68
#[cfg(feature = "crypto")]
@@ -27,8 +29,6 @@ use crate::sign_algo::{algo::*, SignAlgo};
2729
#[cfg(feature = "pem")]
2830
use crate::ENCODE_CONFIG;
2931
use crate::{sign_algo::SignatureAlgorithm, Error};
30-
#[cfg(all(feature = "aws_lc_rs_unstable", not(feature = "fips")))]
31-
use aws_lc_rs::unstable::signature::PqdsaKeyPair;
3232

3333
/// A key pair variant
3434
#[allow(clippy::large_enum_variant)]
@@ -762,7 +762,6 @@ pub(crate) fn serialize_public_key_der(key: &(impl PublicKeyData + ?Sized), writ
762762
#[cfg(all(test, feature = "crypto"))]
763763
mod test {
764764
use super::*;
765-
766765
use crate::ring_like::{
767766
rand::SystemRandom,
768767
signature::{EcdsaKeyPair, ECDSA_P256_SHA256_FIXED_SIGNING},

rcgen/src/lib.rs

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -41,18 +41,6 @@ use std::net::IpAddr;
4141
use std::net::{Ipv4Addr, Ipv6Addr};
4242
use std::ops::Deref;
4343

44-
#[cfg(feature = "pem")]
45-
use pem::Pem;
46-
use pki_types::CertificateDer;
47-
use time::{OffsetDateTime, Time};
48-
use yasna::models::ObjectIdentifier;
49-
use yasna::models::{GeneralizedTime, UTCTime};
50-
use yasna::tags::{TAG_BMPSTRING, TAG_TELETEXSTRING, TAG_UNIVERSALSTRING};
51-
use yasna::DERWriter;
52-
use yasna::Tag;
53-
54-
use crate::string::{BmpString, Ia5String, PrintableString, TeletexString, UniversalString};
55-
5644
pub use certificate::{
5745
date_time_ymd, Attribute, BasicConstraints, Certificate, CertificateParams, CidrSubnet,
5846
CustomExtension, DnType, ExtendedKeyUsagePurpose, GeneralSubtree, IsCa, NameConstraints,
@@ -69,10 +57,21 @@ pub use key_pair::PublicKeyData;
6957
#[cfg(all(feature = "crypto", feature = "aws_lc_rs"))]
7058
pub use key_pair::RsaKeySize;
7159
pub use key_pair::{SigningKey, SubjectPublicKeyInfo};
60+
#[cfg(feature = "pem")]
61+
use pem::Pem;
62+
use pki_types::CertificateDer;
7263
#[cfg(feature = "crypto")]
7364
use ring_like::digest;
7465
pub use sign_algo::algo::*;
7566
pub use sign_algo::SignatureAlgorithm;
67+
use time::{OffsetDateTime, Time};
68+
use yasna::models::ObjectIdentifier;
69+
use yasna::models::{GeneralizedTime, UTCTime};
70+
use yasna::tags::{TAG_BMPSTRING, TAG_TELETEXSTRING, TAG_UNIVERSALSTRING};
71+
use yasna::DERWriter;
72+
use yasna::Tag;
73+
74+
use crate::string::{BmpString, Ia5String, PrintableString, TeletexString, UniversalString};
7675

7776
mod certificate;
7877
mod crl;
@@ -987,9 +986,10 @@ mod tests {
987986

988987
#[cfg(feature = "x509-parser")]
989988
mod test_ip_address_from_octets {
989+
use std::net::IpAddr;
990+
990991
use super::super::ip_addr_from_octets;
991992
use super::super::Error;
992-
use std::net::IpAddr;
993993

994994
#[test]
995995
fn ipv4() {
@@ -1035,10 +1035,12 @@ mod tests {
10351035

10361036
#[cfg(feature = "x509-parser")]
10371037
mod test_san_type_from_general_name {
1038-
use crate::SanType;
10391038
use std::net::IpAddr;
1039+
10401040
use x509_parser::extensions::GeneralName;
10411041

1042+
use crate::SanType;
1043+
10421044
#[test]
10431045
fn with_ipv4() {
10441046
let octets = [1, 2, 3, 4];

rcgen/src/sign_algo.rs

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
use std::fmt;
22
use std::hash::{Hash, Hasher};
33

4+
#[cfg(all(feature = "aws_lc_rs_unstable", not(feature = "fips")))]
5+
use aws_lc_rs::unstable::signature::{
6+
PqdsaSigningAlgorithm, ML_DSA_44_SIGNING, ML_DSA_65_SIGNING, ML_DSA_87_SIGNING,
7+
};
48
use yasna::models::ObjectIdentifier;
59
use yasna::DERWriter;
610
use yasna::Tag;
711

812
#[cfg(feature = "crypto")]
913
use crate::ring_like::signature::{self, EcdsaSigningAlgorithm, EdDSAParameters, RsaEncoding};
1014
use crate::Error;
11-
#[cfg(all(feature = "aws_lc_rs_unstable", not(feature = "fips")))]
12-
use aws_lc_rs::unstable::signature::{
13-
PqdsaSigningAlgorithm, ML_DSA_44_SIGNING, ML_DSA_65_SIGNING, ML_DSA_87_SIGNING,
14-
};
1515

1616
#[cfg(feature = "crypto")]
1717
#[derive(Clone, Copy, Debug)]
@@ -119,9 +119,8 @@ impl SignatureAlgorithm {
119119

120120
/// The list of supported signature algorithms
121121
pub(crate) mod algo {
122-
use crate::oid::*;
123-
124122
use super::*;
123+
use crate::oid::*;
125124

126125
/// RSA signing with PKCS#1 1.5 padding and SHA-256 hashing as per [RFC 4055](https://tools.ietf.org/html/rfc4055)
127126
pub static PKCS_RSA_SHA256: SignatureAlgorithm = SignatureAlgorithm {

verify-tests/src/lib.rs

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
1-
use time::{Duration, OffsetDateTime};
2-
31
use rcgen::{BasicConstraints, Certificate, CertificateParams, Issuer, KeyPair};
42
use rcgen::{
53
CertificateRevocationList, CrlDistributionPoint, CrlIssuingDistributionPoint, CrlScope,
64
};
75
use rcgen::{CertificateRevocationListParams, DnType, IsCa, KeyIdMethod};
86
use rcgen::{KeyUsagePurpose, RevocationReason, RevokedCertParams, SerialNumber};
7+
use time::{Duration, OffsetDateTime};
98

109
// Generated by adding `println!("{}", cert.serialize_private_key_pem());`
1110
// to the test_webpki_25519 test and panicing explicitly.

verify-tests/tests/botan.rs

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,10 @@
11
#![cfg(feature = "x509-parser")]
22

3-
use time::{Duration, OffsetDateTime};
4-
53
use rcgen::{BasicConstraints, Certificate, CertificateParams, DnType, IsCa, Issuer};
64
use rcgen::{CertificateRevocationListParams, RevocationReason, RevokedCertParams};
75
use rcgen::{DnValue, KeyPair};
86
use rcgen::{KeyUsagePurpose, SerialNumber};
9-
7+
use time::{Duration, OffsetDateTime};
108
use verify_tests as util;
119

1210
fn default_params() -> (CertificateParams, KeyPair) {

0 commit comments

Comments
 (0)