@@ -1649,7 +1649,8 @@ fn test_shadowsocks_runtime_ipv4_unavailable() {
1649
1649
ipv6 : true ,
1650
1650
} ;
1651
1651
let user_result = relay_selector. get_relay ( 0 , runtime_parameters) . unwrap ( ) ;
1652
- assert ! ( matches!( user_result, GetRelay :: Wireguard {
1652
+ assert ! (
1653
+ matches!( user_result, GetRelay :: Wireguard {
1653
1654
obfuscator: Some ( SelectedObfuscator {
1654
1655
config: ObfuscatorConfig :: Shadowsocks {
1655
1656
endpoint,
@@ -1658,16 +1659,16 @@ fn test_shadowsocks_runtime_ipv4_unavailable() {
1658
1659
..
1659
1660
} ) ,
1660
1661
..
1661
- } if endpoint. is_ipv6( ) ) , "expected IPv6 endpoint for Shadowsocks, got {user_result:?}" ) ;
1662
+ } if endpoint. is_ipv6( ) ) ,
1663
+ "expected IPv6 endpoint for Shadowsocks, got {user_result:?}"
1664
+ ) ;
1662
1665
}
1663
1666
1664
- /// Check that if IPv4 is not available, and IPv6 endpoint is returned.
1667
+ /// Check that if IPv4 is not available, a relay with an IPv6 endpoint is returned.
1665
1668
#[ test]
1666
1669
fn test_runtime_ipv4_unavailable ( ) {
1667
1670
// Make a valid user relay constraint
1668
- let ( relay_constraints, _, _, _) = RelayQueryBuilder :: wireguard ( )
1669
- . build ( )
1670
- . into_settings ( ) ;
1671
+ let ( relay_constraints, _, _, _) = RelayQueryBuilder :: wireguard ( ) . build ( ) . into_settings ( ) ;
1671
1672
1672
1673
let config = SelectorConfig {
1673
1674
relay_settings : relay_constraints. into ( ) ,
@@ -1680,10 +1681,7 @@ fn test_runtime_ipv4_unavailable() {
1680
1681
} ;
1681
1682
let relay = relay_selector. get_relay ( 0 , runtime_parameters) . unwrap ( ) ;
1682
1683
match relay {
1683
- GetRelay :: Wireguard {
1684
- endpoint,
1685
- ..
1686
- } => {
1684
+ GetRelay :: Wireguard { endpoint, .. } => {
1687
1685
assert ! (
1688
1686
endpoint. peer. endpoint. is_ipv6( ) ,
1689
1687
"expected IPv6 endpoint, got {endpoint:?}" ,
0 commit comments