From a18206a0d09cbfdf63937038f05b29333ac113dd Mon Sep 17 00:00:00 2001 From: Alexander Scheel Date: Fri, 7 Jul 2023 15:21:17 -0400 Subject: [PATCH] Fix formatting errors Signed-off-by: Alexander Scheel --- builtin/logical/pki/path_acme_test.go | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/builtin/logical/pki/path_acme_test.go b/builtin/logical/pki/path_acme_test.go index d9a2c5743700..335200f903af 100644 --- a/builtin/logical/pki/path_acme_test.go +++ b/builtin/logical/pki/path_acme_test.go @@ -1021,23 +1021,23 @@ func TestACMESubjectFieldsAndExtensionsIgnored(t *testing.T) { acmeClient := getAcmeClientForCluster(t, cluster, directory, nil) cr := &x509.CertificateRequest{ Subject: pkix.Name{CommonName: domains[0], OrganizationalUnit: []string{"DadgarCorp IT"}}, - DNSNames: domains, - } + DNSNames: domains, + } cert := doACMEForCSRWithDNS(t, dns, acmeClient, domains, cr) t.Logf("Got certificate: %v", cert) require.Empty(t, cert.Subject.OrganizationalUnit) - // Use the default sign-verbatim policy and ensure extension does not get set. - domains = []string{"no-ext.dadgarcorp.com"} + // Use the default sign-verbatim policy and ensure extension does not get set. + domains = []string{"no-ext.dadgarcorp.com"} extension, err := certutil.CreateDeltaCRLIndicatorExt(12345) require.NoError(t, err) - cr = &x509.CertificateRequest{ - Subject: pkix.Name{CommonName: domains[0]}, - DNSNames: domains, + cr = &x509.CertificateRequest{ + Subject: pkix.Name{CommonName: domains[0]}, + DNSNames: domains, ExtraExtensions: []pkix.Extension{extension}, - } - cert = doACMEForCSRWithDNS(t, dns, acmeClient, domains, cr) - t.Logf("Got certificate: %v", cert) + } + cert = doACMEForCSRWithDNS(t, dns, acmeClient, domains, cr) + t.Logf("Got certificate: %v", cert) for _, ext := range cert.Extensions { require.False(t, ext.Id.Equal(certutil.DeltaCRLIndicatorOID)) }