From 8379728d6eb095fd49cdec3d1554e915462aacba Mon Sep 17 00:00:00 2001 From: "alex.berger@nexiot.ch" Date: Fri, 27 Nov 2020 17:58:05 +0100 Subject: [PATCH] fix formatting --- sqlx-core/src/net/tls/rustls.rs | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/sqlx-core/src/net/tls/rustls.rs b/sqlx-core/src/net/tls/rustls.rs index 20044e51..821440b9 100644 --- a/sqlx-core/src/net/tls/rustls.rs +++ b/sqlx-core/src/net/tls/rustls.rs @@ -1,11 +1,11 @@ +use crate::net::CertificateInput; use rustls::{ Certificate, ClientConfig, RootCertStore, ServerCertVerified, ServerCertVerifier, TLSError, WebPKIVerifier, }; +use std::io::Cursor; use std::sync::Arc; -use std::{io::Cursor}; use webpki::DNSNameRef; -use crate::net::CertificateInput; use crate::error::Error; @@ -28,9 +28,10 @@ pub async fn configure_tls_connector( if let Some(ca) = root_cert_path { let data = ca.data().await?; let mut cursor = Cursor::new(data); - config.root_store.add_pem_file(&mut cursor).map_err(|_| { - Error::Tls(format!("Invalid certificate {}", ca).into()) - })?; + config + .root_store + .add_pem_file(&mut cursor) + .map_err(|_| Error::Tls(format!("Invalid certificate {}", ca).into()))?; } if accept_invalid_hostnames {