Skip to content

Commit 4c84aea

Browse files
committed
Rename the convenience function ro build()
1 parent 07fcc89 commit 4c84aea

File tree

3 files changed

+15
-23
lines changed

3 files changed

+15
-23
lines changed

crates/stackable-certs/src/ca/ca_builder.rs

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -67,10 +67,11 @@ where
6767
/// };
6868
///
6969
/// let ca = CertificateAuthority::<ecdsa::SigningKey>::builder()
70-
/// .build_ca()
70+
/// .build()
7171
/// .expect("failed to build CA");
7272
/// ```
7373
#[derive(Builder)]
74+
#[builder(finish_fn = finish_builder)]
7475
pub struct CertificateAuthorityBuilder<'a, SKP>
7576
where
7677
SKP: CertificateKeypair,
@@ -103,11 +104,11 @@ where
103104
<SKP::SigningKey as signature::Keypair>::VerifyingKey: EncodePublicKey,
104105
S: certificate_authority_builder_builder::IsComplete,
105106
{
106-
/// Convenience function to avoid calling `builder().build().build_ca()`
107-
pub fn build_ca(
107+
/// Convenience function to avoid calling `builder().finish_builder().build()`
108+
pub fn build(
108109
self: Self,
109110
) -> Result<CertificateAuthority<SKP>, CreateCertificateAuthorityError<SKP::Error>> {
110-
self.build().build_ca()
111+
self.finish_builder().build()
111112
}
112113
}
113114

@@ -116,7 +117,7 @@ where
116117
SKP: CertificateKeypair,
117118
<SKP::SigningKey as signature::Keypair>::VerifyingKey: EncodePublicKey,
118119
{
119-
pub fn build_ca(
120+
pub fn build(
120121
self,
121122
) -> Result<CertificateAuthority<SKP>, CreateCertificateAuthorityError<SKP::Error>> {
122123
let serial_number =
@@ -196,7 +197,6 @@ mod tests {
196197
fn minimal_ca() {
197198
let ca: CertificateAuthority<ecdsa::SigningKey> = CertificateAuthorityBuilder::builder()
198199
.build()
199-
.build_ca()
200200
.expect("failed to build CA");
201201

202202
assert_ca_cert_attributes(
@@ -215,7 +215,6 @@ mod tests {
215215
.signing_key_pair(rsa::SigningKey::new().unwrap())
216216
.validity(Duration::from_days_unchecked(13))
217217
.build()
218-
.build_ca()
219218
.expect("failed to build CA");
220219

221220
assert_ca_cert_attributes(

crates/stackable-certs/src/cert_builder.rs

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -74,16 +74,17 @@ where
7474
/// };
7575
///
7676
/// let ca = CertificateAuthority::<ecdsa::SigningKey>::builder()
77-
/// .build_ca()
77+
/// .build()
7878
/// .expect("failed to build CA");
7979
///
8080
/// let certificate = CertificatePair::builder()
8181
/// .subject("CN=trino-coordinator-default-0")
8282
/// .signed_by(&ca)
83-
/// .build_certificate()
83+
/// .build()
8484
/// .expect("failed to build certificate");
8585
/// ```
8686
#[derive(Builder)]
87+
#[builder(finish_fn = finish_builder)]
8788
pub struct CertificateBuilder<'a, KP>
8889
where
8990
KP: CertificateKeypair,
@@ -123,11 +124,9 @@ where
123124
<KP::SigningKey as signature::Keypair>::VerifyingKey: EncodePublicKey,
124125
S: certificate_builder_builder::IsComplete,
125126
{
126-
/// Convenience function to avoid calling `builder().build().build_certificate()`
127-
pub fn build_certificate(
128-
self,
129-
) -> Result<CertificatePair<KP>, CreateCertificateError<KP::Error>> {
130-
self.build().build_certificate()
127+
/// Convenience function to avoid calling `builder().finish_builder().build()`
128+
pub fn build(self) -> Result<CertificatePair<KP>, CreateCertificateError<KP::Error>> {
129+
self.finish_builder().build()
131130
}
132131
}
133132

@@ -136,9 +135,7 @@ where
136135
KP: CertificateKeypair,
137136
<KP::SigningKey as signature::Keypair>::VerifyingKey: EncodePublicKey,
138137
{
139-
pub fn build_certificate(
140-
self,
141-
) -> Result<CertificatePair<KP>, CreateCertificateError<KP::Error>> {
138+
pub fn build(self) -> Result<CertificatePair<KP>, CreateCertificateError<KP::Error>> {
142139
let serial_number =
143140
SerialNumber::from(self.serial_number.unwrap_or_else(|| rand::random::<u64>()));
144141

@@ -241,7 +238,6 @@ mod tests {
241238
.subject("CN=trino-coordinator-default-0")
242239
.signed_by(&ca)
243240
.build()
244-
.build_certificate()
245241
.expect("failed to build certificate");
246242

247243
assert_certificate_attributes(
@@ -268,7 +264,6 @@ mod tests {
268264
.key_pair(rsa::SigningKey::new().unwrap())
269265
.signed_by(&ca)
270266
.build()
271-
.build_certificate()
272267
.expect("failed to build certificate");
273268

274269
assert_certificate_attributes(
@@ -329,14 +324,12 @@ mod tests {
329324
fn get_ecdsa_ca() -> CertificateAuthority<ecdsa::SigningKey> {
330325
CertificateAuthorityBuilder::builder()
331326
.build()
332-
.build_ca()
333327
.expect("failed to build CA")
334328
}
335329

336330
fn get_rsa_ca() -> CertificateAuthority<rsa::SigningKey> {
337331
CertificateAuthorityBuilder::builder()
338332
.build()
339-
.build_ca()
340333
.expect("failed to build CA")
341334
}
342335
}

crates/stackable-webhook/src/tls.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,13 +110,13 @@ impl TlsServer {
110110
// See https://docs.rs/tokio/latest/tokio/task/fn.spawn_blocking.html
111111
let task = tokio::task::spawn_blocking(move || {
112112
let ca: CertificateAuthority<ecdsa::SigningKey> = CertificateAuthority::builder()
113-
.build_ca()
113+
.build()
114114
.context(CreateCertificateAuthoritySnafu)?;
115115

116116
let certificate = CertificatePair::builder()
117117
.subject("CN=webhook")
118118
.signed_by(&ca)
119-
.build_certificate()
119+
.build()
120120
.context(CreateCertificateSnafu)?;
121121

122122
let certificate_der = certificate

0 commit comments

Comments
 (0)