From f52f9fd65fd4e47b1097bd9e7b7777fcf5b09b6b Mon Sep 17 00:00:00 2001 From: Sharang Parnerkar Date: Sun, 8 Mar 2026 00:35:48 +0100 Subject: [PATCH] Run cargo fmt across all crates Co-Authored-By: Claude Opus 4.6 --- compliance-agent/src/api/auth_middleware.rs | 7 +++---- compliance-agent/src/api/server.rs | 11 ++++------- 2 files changed, 7 insertions(+), 11 deletions(-) diff --git a/compliance-agent/src/api/auth_middleware.rs b/compliance-agent/src/api/auth_middleware.rs index 7fec06c..90e3a49 100644 --- a/compliance-agent/src/api/auth_middleware.rs +++ b/compliance-agent/src/api/auth_middleware.rs @@ -62,8 +62,7 @@ pub async fn require_jwt_auth(request: Request, next: Next) -> Response { } async fn validate_token(token: &str, state: &JwksState) -> Result<(), String> { - let header = - decode_header(token).map_err(|e| format!("failed to decode JWT header: {e}"))?; + let header = decode_header(token).map_err(|e| format!("failed to decode JWT header: {e}"))?; let kid = header .kid @@ -77,8 +76,8 @@ async fn validate_token(token: &str, state: &JwksState) -> Result<(), String> { .find(|k| k.common.key_id.as_deref() == Some(&kid)) .ok_or_else(|| "no matching key found in JWKS".to_string())?; - let decoding_key = DecodingKey::from_jwk(jwk) - .map_err(|e| format!("failed to create decoding key: {e}"))?; + let decoding_key = + DecodingKey::from_jwk(jwk).map_err(|e| format!("failed to create decoding key: {e}"))?; let mut validation = Validation::new(header.alg); validation.validate_exp = true; diff --git a/compliance-agent/src/api/server.rs b/compliance-agent/src/api/server.rs index 7d4ef98..3038083 100644 --- a/compliance-agent/src/api/server.rs +++ b/compliance-agent/src/api/server.rs @@ -16,13 +16,10 @@ pub async fn start_api_server(agent: ComplianceAgent, port: u16) -> Result<(), A .layer(CorsLayer::permissive()) .layer(TraceLayer::new_for_http()); - if let (Some(kc_url), Some(kc_realm)) = ( - &agent.config.keycloak_url, - &agent.config.keycloak_realm, - ) { - let jwks_url = format!( - "{kc_url}/realms/{kc_realm}/protocol/openid-connect/certs" - ); + if let (Some(kc_url), Some(kc_realm)) = + (&agent.config.keycloak_url, &agent.config.keycloak_realm) + { + let jwks_url = format!("{kc_url}/realms/{kc_realm}/protocol/openid-connect/certs"); let jwks_state = JwksState { jwks: Arc::new(RwLock::new(None)), jwks_url,