@@ -298,7 +298,8 @@ async fn over_session_ok() {
298298 for session in connects ( ) . await {
299299 let mut command = std:: process:: Command :: new ( "echo" )
300300 . arg ( "foo" )
301- . over_ssh ( & session) . expect ( "No env vars or current working dir is set." ) ;
301+ . over_ssh ( & session)
302+ . expect ( "No env vars or current working dir is set." ) ;
302303
303304 let child = command. output ( ) . await . unwrap ( ) ;
304305 assert_eq ! ( child. stdout, b"foo\n " ) ;
@@ -317,14 +318,14 @@ async fn over_session_ok() {
317318 }
318319}
319320
320-
321321#[ tokio:: test]
322322#[ cfg_attr( not( ci) , ignore) ]
323323async fn over_session_ok_require_escaping_arguments ( ) {
324324 for session in connects ( ) . await {
325325 let mut command = std:: process:: Command :: new ( "echo" )
326326 . arg ( "\" \' \' foo \' \' \" " )
327- . over_ssh ( & session) . expect ( "No env vars or current working dir is set." ) ;
327+ . over_ssh ( & session)
328+ . expect ( "No env vars or current working dir is set." ) ;
328329
329330 let child = command. output ( ) . await . unwrap ( ) ;
330331 assert_eq ! ( child. stdout, b"\" \' \' foo \' \' \" \n " ) ;
@@ -352,7 +353,10 @@ async fn over_session_err_because_env_var() {
352353 . arg ( "MY_ENV_VAR" )
353354 . env ( "MY_ENV_VAR" , "foo" )
354355 . over_ssh ( & session) ;
355- assert ! ( matches!( command_with_env, Err ( openssh:: Error :: CommandHasEnv ) ) ) ;
356+ assert ! ( matches!(
357+ command_with_env,
358+ Err ( openssh:: Error :: CommandHasEnv )
359+ ) ) ;
356360 }
357361}
358362
@@ -365,7 +369,10 @@ async fn over_session_err_because_cwd() {
365369 . arg ( "foo" )
366370 . current_dir ( "/tmp" )
367371 . over_ssh ( & session) ;
368- assert ! ( matches!( command_with_current_dir, Err ( openssh:: Error :: CommandHasCwd ) ) ) ;
372+ assert ! ( matches!(
373+ command_with_current_dir,
374+ Err ( openssh:: Error :: CommandHasCwd )
375+ ) ) ;
369376 }
370377}
371378
0 commit comments