diff --git a/crates/p2p/src/peer/peer.rs b/crates/p2p/src/peer/peer.rs index 9f688e5aa..4a9c91a4c 100644 --- a/crates/p2p/src/peer/peer.rs +++ b/crates/p2p/src/peer/peer.rs @@ -14,7 +14,7 @@ use crate::{NetworkManager, P2PManager, PeerMetadata}; /// QUIC is a client/server protocol so when doing P2P communication one client will be the server and one will be the client from a QUIC perspective. /// The protocol is bi-directional so this doesn't matter a huge amount and the P2P library does it's best to hide this detail from the embedding application as thinking about this can be very confusing. /// The decision for who is the client and server should be treated as arbitrary and shouldn't affect how the protocol operates. -#[derive(Debug, Clone, PartialEq)] +#[derive(Debug, Clone, PartialEq, Eq)] pub enum ConnectionType { /// I am the QUIC server. Server, diff --git a/crates/p2p/tunnel/src/bin/generate-env.rs b/crates/p2p/tunnel/src/bin/generate-env.rs index a7c4333d0..b2de3ca8a 100644 --- a/crates/p2p/tunnel/src/bin/generate-env.rs +++ b/crates/p2p/tunnel/src/bin/generate-env.rs @@ -13,8 +13,7 @@ fn main() { } // TODO: Replace 'generate_simple_self_signed' with full code so we have full control over generated certificate. - let cert = - generate_simple_self_signed(vec!["sdtunnel.spacedrive.com".into()]).unwrap(); + let cert = generate_simple_self_signed(vec!["sdtunnel.spacedrive.com".into()]).unwrap(); match fs::write( env_file, @@ -26,7 +25,7 @@ SD_REDIS_URL=redis://127.0.0.1/"#, encode(cert.serialize_private_key_der()) ), ) { - Ok(_) => {}, + Ok(_) => {} Err(err) => println!("Error writing to '{}': {}", env_file.display(), err), }