diff --git a/deeplink/tests/proptest.rs b/deeplink/tests/proptest.rs index 9d20dde..cae3334 100644 --- a/deeplink/tests/proptest.rs +++ b/deeplink/tests/proptest.rs @@ -3,9 +3,8 @@ use trusttunnel_deeplink::{decode, encode, DeepLinkConfig, Protocol}; fn arbitrary_address_string() -> impl Strategy { prop_oneof![ - (any::<[u8; 4]>(), 1u16..=65535).prop_map(|(ip, port)| { - format!("{}.{}.{}.{}:{}", ip[0], ip[1], ip[2], ip[3], port) - }), + (any::<[u8; 4]>(), 1u16..=65535) + .prop_map(|(ip, port)| { format!("{}.{}.{}.{}:{}", ip[0], ip[1], ip[2], ip[3], port) }), "[a-z]{3,15}\\.[a-z]{2,10}\\.[a-z]{2,5}:[0-9]{2,5}", ] } diff --git a/lib/src/core.rs b/lib/src/core.rs index d267e5f..e93c9d0 100644 --- a/lib/src/core.rs +++ b/lib/src/core.rs @@ -554,7 +554,10 @@ impl Core { client_id: log_utils::IdChain, ) { // Apply connection filtering rules - let client_ip = socket.peer_addr().ok().map(|addr| net_utils::unmap_ipv6(addr.ip())); + let client_ip = socket + .peer_addr() + .ok() + .map(|addr| net_utils::unmap_ipv6(addr.ip())); let client_random = Some(socket.client_random()); if let Err(deny_reason) = Self::evaluate_connection_rules(