Skip to content

Commit e5203ef

Browse files
committed
Rewrite unidiomatic use of or() combinator
1 parent 076cbb1 commit e5203ef

File tree

4 files changed

+13
-13
lines changed

4 files changed

+13
-13
lines changed

rcgen/src/certificate.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ impl CertificateParams {
172172
/// See [`from_ca_cert_der`](Self::from_ca_cert_der) for more details.
173173
#[cfg(all(feature = "pem", feature = "x509-parser"))]
174174
pub fn from_ca_cert_pem(pem_str: &str) -> Result<Self, Error> {
175-
let certificate = pem::parse(pem_str).or(Err(Error::CouldNotParseCertificate))?;
175+
let certificate = pem::parse(pem_str).map_err(|_| Error::CouldNotParseCertificate)?;
176176
Self::from_ca_cert_der(&certificate.contents().into())
177177
}
178178

@@ -200,7 +200,7 @@ impl CertificateParams {
200200
#[cfg(feature = "x509-parser")]
201201
pub fn from_ca_cert_der(ca_cert: &CertificateDer<'_>) -> Result<Self, Error> {
202202
let (_remainder, x509) = x509_parser::parse_x509_certificate(ca_cert)
203-
.or(Err(Error::CouldNotParseCertificate))?;
203+
.map_err(|_| Error::CouldNotParseCertificate)?;
204204

205205
Ok(CertificateParams {
206206
is_ca: IsCa::from_x509(&x509)?,
@@ -805,7 +805,7 @@ impl ExtendedKeyUsagePurpose {
805805
fn from_x509(x509: &x509_parser::certificate::X509Certificate<'_>) -> Result<Vec<Self>, Error> {
806806
let extended_key_usage = x509
807807
.extended_key_usage()
808-
.or(Err(Error::CouldNotParseCertificate))?
808+
.map_err(|_| Error::CouldNotParseCertificate)?
809809
.map(|ext| ext.value);
810810

811811
let mut extended_key_usages = Vec::new();
@@ -872,7 +872,7 @@ impl NameConstraints {
872872
) -> Result<Option<Self>, Error> {
873873
let constraints = x509
874874
.name_constraints()
875-
.or(Err(Error::CouldNotParseCertificate))?
875+
.map_err(|_| Error::CouldNotParseCertificate)?
876876
.map(|ext| ext.value);
877877

878878
let Some(constraints) = constraints else {
@@ -1097,7 +1097,7 @@ impl IsCa {
10971097

10981098
let basic_constraints = x509
10991099
.basic_constraints()
1100-
.or(Err(Error::CouldNotParseCertificate))?
1100+
.map_err(|_| Error::CouldNotParseCertificate)?
11011101
.map(|ext| ext.value);
11021102

11031103
Ok(match basic_constraints {

rcgen/src/csr.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ impl CertificateSigningRequestParams {
8080
/// See [`from_der`](Self::from_der) for more details.
8181
#[cfg(all(feature = "pem", feature = "x509-parser"))]
8282
pub fn from_pem(pem_str: &str) -> Result<Self, Error> {
83-
let csr = pem::parse(pem_str).or(Err(Error::CouldNotParseCertificationRequest))?;
83+
let csr = pem::parse(pem_str).map_err(|_| Error::CouldNotParseCertificationRequest)?;
8484
Self::from_der(&csr.contents().into())
8585
}
8686

rcgen/src/lib.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ impl SanType {
182182
fn from_x509(x509: &x509_parser::certificate::X509Certificate<'_>) -> Result<Vec<Self>, Error> {
183183
let sans = x509
184184
.subject_alternative_name()
185-
.or(Err(Error::CouldNotParseCertificate))?
185+
.map_err(|_| Error::CouldNotParseCertificate)?
186186
.map(|ext| &ext.value.general_names);
187187

188188
let Some(sans) = sans else {
@@ -473,7 +473,7 @@ impl KeyUsagePurpose {
473473
fn from_x509(x509: &x509_parser::certificate::X509Certificate<'_>) -> Result<Vec<Self>, Error> {
474474
let key_usage = x509
475475
.key_usage()
476-
.or(Err(Error::CouldNotParseCertificate))?
476+
.map_err(|_| Error::CouldNotParseCertificate)?
477477
.map(|ext| ext.value);
478478
// This x509 parser stores flags in reversed bit BIT STRING order
479479
let flags = key_usage.map_or(0u16, |k| k.flags).reverse_bits();

rustls-cert-gen/src/cert.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -250,8 +250,8 @@ impl KeyPairAlgorithm {
250250

251251
let rng = ring_like::rand::SystemRandom::new();
252252
let alg = &rcgen::PKCS_ED25519;
253-
let pkcs8_bytes =
254-
Ed25519KeyPair::generate_pkcs8(&rng).or(Err(rcgen::Error::RingUnspecified))?;
253+
let pkcs8_bytes = Ed25519KeyPair::generate_pkcs8(&rng)
254+
.map_err(|_| rcgen::Error::RingUnspecified)?;
255255

256256
rcgen::KeyPair::from_pkcs8_der_and_sign_algo(&pkcs8_bytes.as_ref().into(), alg)
257257
},
@@ -263,7 +263,7 @@ impl KeyPairAlgorithm {
263263
let alg = &rcgen::PKCS_ECDSA_P256_SHA256;
264264
let pkcs8_bytes =
265265
EcdsaKeyPair::generate_pkcs8(&ECDSA_P256_SHA256_ASN1_SIGNING, &rng)
266-
.or(Err(rcgen::Error::RingUnspecified))?;
266+
.map_err(|_| rcgen::Error::RingUnspecified)?;
267267
rcgen::KeyPair::from_pkcs8_der_and_sign_algo(&pkcs8_bytes.as_ref().into(), alg)
268268
},
269269
KeyPairAlgorithm::EcdsaP384 => {
@@ -274,7 +274,7 @@ impl KeyPairAlgorithm {
274274
let alg = &rcgen::PKCS_ECDSA_P384_SHA384;
275275
let pkcs8_bytes =
276276
EcdsaKeyPair::generate_pkcs8(&ECDSA_P384_SHA384_ASN1_SIGNING, &rng)
277-
.or(Err(rcgen::Error::RingUnspecified))?;
277+
.map_err(|_| rcgen::Error::RingUnspecified)?;
278278

279279
rcgen::KeyPair::from_pkcs8_der_and_sign_algo(&pkcs8_bytes.as_ref().into(), alg)
280280
},
@@ -287,7 +287,7 @@ impl KeyPairAlgorithm {
287287
let alg = &rcgen::PKCS_ECDSA_P521_SHA512;
288288
let pkcs8_bytes =
289289
EcdsaKeyPair::generate_pkcs8(&ECDSA_P521_SHA512_ASN1_SIGNING, &rng)
290-
.or(Err(rcgen::Error::RingUnspecified))?;
290+
.map_err(|_| rcgen::Error::RingUnspecified)?;
291291

292292
rcgen::KeyPair::from_pkcs8_der_and_sign_algo(&pkcs8_bytes.as_ref().into(), alg)
293293
},

0 commit comments

Comments
 (0)