@@ -298,7 +298,8 @@ async fn over_session_ok() {
298
298
for session in connects ( ) . await {
299
299
let mut command = std:: process:: Command :: new ( "echo" )
300
300
. arg ( "foo" )
301
- . over_ssh ( & session) . expect ( "No env vars or current working dir is set." ) ;
301
+ . over_ssh ( & session)
302
+ . expect ( "No env vars or current working dir is set." ) ;
302
303
303
304
let child = command. output ( ) . await . unwrap ( ) ;
304
305
assert_eq ! ( child. stdout, b"foo\n " ) ;
@@ -317,14 +318,14 @@ async fn over_session_ok() {
317
318
}
318
319
}
319
320
320
-
321
321
#[ tokio:: test]
322
322
#[ cfg_attr( not( ci) , ignore) ]
323
323
async fn over_session_ok_require_escaping_arguments ( ) {
324
324
for session in connects ( ) . await {
325
325
let mut command = std:: process:: Command :: new ( "echo" )
326
326
. arg ( "\" \' \' foo \' \' \" " )
327
- . over_ssh ( & session) . expect ( "No env vars or current working dir is set." ) ;
327
+ . over_ssh ( & session)
328
+ . expect ( "No env vars or current working dir is set." ) ;
328
329
329
330
let child = command. output ( ) . await . unwrap ( ) ;
330
331
assert_eq ! ( child. stdout, b"\" \' \' foo \' \' \" \n " ) ;
@@ -352,7 +353,10 @@ async fn over_session_err_because_env_var() {
352
353
. arg ( "MY_ENV_VAR" )
353
354
. env ( "MY_ENV_VAR" , "foo" )
354
355
. over_ssh ( & session) ;
355
- assert ! ( matches!( command_with_env, Err ( openssh:: Error :: CommandHasEnv ) ) ) ;
356
+ assert ! ( matches!(
357
+ command_with_env,
358
+ Err ( openssh:: Error :: CommandHasEnv )
359
+ ) ) ;
356
360
}
357
361
}
358
362
@@ -365,7 +369,10 @@ async fn over_session_err_because_cwd() {
365
369
. arg ( "foo" )
366
370
. current_dir ( "/tmp" )
367
371
. over_ssh ( & session) ;
368
- assert ! ( matches!( command_with_current_dir, Err ( openssh:: Error :: CommandHasCwd ) ) ) ;
372
+ assert ! ( matches!(
373
+ command_with_current_dir,
374
+ Err ( openssh:: Error :: CommandHasCwd )
375
+ ) ) ;
369
376
}
370
377
}
371
378
0 commit comments