From 471ff0e972792e91a50fded6b35326ef6f643ce8 Mon Sep 17 00:00:00 2001 From: ryan Date: Mon, 8 Jan 2024 14:26:22 -0500 Subject: [PATCH] keyfork: `cargo fmt` --- keyfork/src/cli/derive.rs | 11 +++++++++-- keyfork/src/cli/mod.rs | 2 +- keyfork/src/cli/recover.rs | 7 +++++-- keyfork/src/cli/wizard.rs | 7 +------ keyfork/src/main.rs | 4 ++-- 5 files changed, 18 insertions(+), 13 deletions(-) diff --git a/keyfork/src/cli/derive.rs b/keyfork/src/cli/derive.rs index 3970928..9da9aa3 100644 --- a/keyfork/src/cli/derive.rs +++ b/keyfork/src/cli/derive.rs @@ -1,12 +1,17 @@ use super::Keyfork; use clap::{Parser, Subcommand}; +use keyfork_derive_openpgp::openpgp::{ + armor::{Kind, Writer}, + packet::UserID, + serialize::Marshal, + types::KeyFlags, +}; use keyfork_derive_util::{ request::{DerivationAlgorithm, DerivationRequest, DerivationResponse}, DerivationIndex, DerivationPath, }; use keyforkd_client::Client; -use keyfork_derive_openpgp::openpgp::{types::KeyFlags, packet::UserID, armor::{Kind, Writer}, serialize::Marshal}; type Result> = std::result::Result; @@ -34,7 +39,9 @@ impl DeriveSubcommands { let subkeys = vec![ KeyFlags::empty().set_certification(), KeyFlags::empty().set_signing(), - KeyFlags::empty().set_transport_encryption().set_storage_encryption(), + KeyFlags::empty() + .set_transport_encryption() + .set_storage_encryption(), KeyFlags::empty().set_authentication(), ]; let request = DerivationRequest::new(DerivationAlgorithm::Ed25519, &path); diff --git a/keyfork/src/cli/mod.rs b/keyfork/src/cli/mod.rs index e304b23..5bd4b1d 100644 --- a/keyfork/src/cli/mod.rs +++ b/keyfork/src/cli/mod.rs @@ -3,8 +3,8 @@ use clap::{Parser, Subcommand}; mod derive; mod mnemonic; mod provision; -mod shard; mod recover; +mod shard; mod wizard; /// The Kitchen Sink of Entropy. diff --git a/keyfork/src/cli/recover.rs b/keyfork/src/cli/recover.rs index 649c9a2..0c7e8ea 100644 --- a/keyfork/src/cli/recover.rs +++ b/keyfork/src/cli/recover.rs @@ -3,7 +3,10 @@ use clap::{Parser, Subcommand}; use std::path::PathBuf; use keyfork_mnemonic_util::Mnemonic; -use keyfork_shard::{remote_decrypt, openpgp::{combine, discover_certs, parse_messages}}; +use keyfork_shard::{ + openpgp::{combine, discover_certs, parse_messages}, + remote_decrypt, +}; type Result> = std::result::Result; @@ -46,7 +49,7 @@ impl RecoverSubcommands { let mut seed = vec![]; remote_decrypt(&mut seed)?; Ok(seed) - }, + } } } } diff --git a/keyfork/src/cli/wizard.rs b/keyfork/src/cli/wizard.rs index d95997a..90e7a3f 100644 --- a/keyfork/src/cli/wizard.rs +++ b/keyfork/src/cli/wizard.rs @@ -112,12 +112,7 @@ fn generate_shard_secret(threshold: u8, max: u8, keys_per_shard: u8) -> Result<( // prompt_passphrase let user_pin = pm.prompt_passphrase("Please enter the new smartcard User PIN: ")?; let admin_pin = pm.prompt_passphrase("Please enter the new smartcard Admin PIN: ")?; - factory_reset_current_card( - &mut seen_cards, - user_pin.trim(), - admin_pin.trim(), - &cert, - )?; + factory_reset_current_card(&mut seen_cards, user_pin.trim(), admin_pin.trim(), &cert)?; } certs.push(cert); } diff --git a/keyfork/src/main.rs b/keyfork/src/main.rs index bf4391b..1a718ea 100644 --- a/keyfork/src/main.rs +++ b/keyfork/src/main.rs @@ -3,13 +3,13 @@ use std::process::ExitCode; use clap::Parser; -mod config; mod cli; +mod config; fn main() -> ExitCode { let opts = cli::Keyfork::parse(); - if let Err(e) = opts.command .handle(&opts) { + if let Err(e) = opts.command.handle(&opts) { eprintln!("Unable to run command: {e}"); let mut source = e.source(); while let Some(new_error) = source.take() {