Skip to content

Commit 74ea754

Browse files
committed
Restore Rust formatting compliance
Run rustfmt from the Rust workspace so CI format checks pass without changing behavior. Constraint: Scope is formatting-only across tracked Rust files Confidence: high Scope-risk: narrow Tested: cd rust && cargo fmt --check Tested: git diff --check
1 parent 77afde7 commit 74ea754

5 files changed

Lines changed: 140 additions & 87 deletions

File tree

rust/crates/api/src/providers/mod.rs

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -753,26 +753,28 @@ mod tests {
753753
#[test]
754754
fn returns_context_window_metadata_for_kimi_models() {
755755
// kimi-k2.5
756-
let k25_limit = model_token_limit("kimi-k2.5")
757-
.expect("kimi-k2.5 should have token limit metadata");
756+
let k25_limit =
757+
model_token_limit("kimi-k2.5").expect("kimi-k2.5 should have token limit metadata");
758758
assert_eq!(k25_limit.max_output_tokens, 16_384);
759759
assert_eq!(k25_limit.context_window_tokens, 256_000);
760760

761761
// kimi-k1.5
762-
let k15_limit = model_token_limit("kimi-k1.5")
763-
.expect("kimi-k1.5 should have token limit metadata");
762+
let k15_limit =
763+
model_token_limit("kimi-k1.5").expect("kimi-k1.5 should have token limit metadata");
764764
assert_eq!(k15_limit.max_output_tokens, 16_384);
765765
assert_eq!(k15_limit.context_window_tokens, 256_000);
766766
}
767767

768768
#[test]
769769
fn kimi_alias_resolves_to_kimi_k25_token_limits() {
770770
// The "kimi" alias resolves to "kimi-k2.5" via resolve_model_alias()
771-
let alias_limit = model_token_limit("kimi")
772-
.expect("kimi alias should resolve to kimi-k2.5 limits");
773-
let direct_limit = model_token_limit("kimi-k2.5")
774-
.expect("kimi-k2.5 should have limits");
775-
assert_eq!(alias_limit.max_output_tokens, direct_limit.max_output_tokens);
771+
let alias_limit =
772+
model_token_limit("kimi").expect("kimi alias should resolve to kimi-k2.5 limits");
773+
let direct_limit = model_token_limit("kimi-k2.5").expect("kimi-k2.5 should have limits");
774+
assert_eq!(
775+
alias_limit.max_output_tokens,
776+
direct_limit.max_output_tokens
777+
);
776778
assert_eq!(
777779
alias_limit.context_window_tokens,
778780
direct_limit.context_window_tokens

rust/crates/api/src/providers/openai_compat.rs

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2195,9 +2195,16 @@ mod tests {
21952195

21962196
#[test]
21972197
fn provider_specific_size_limits_are_correct() {
2198-
assert_eq!(OpenAiCompatConfig::dashscope().max_request_body_bytes, 6_291_456); // 6MB
2199-
assert_eq!(OpenAiCompatConfig::openai().max_request_body_bytes, 104_857_600); // 100MB
2200-
assert_eq!(OpenAiCompatConfig::xai().max_request_body_bytes, 52_428_800); // 50MB
2198+
assert_eq!(
2199+
OpenAiCompatConfig::dashscope().max_request_body_bytes,
2200+
6_291_456
2201+
); // 6MB
2202+
assert_eq!(
2203+
OpenAiCompatConfig::openai().max_request_body_bytes,
2204+
104_857_600
2205+
); // 100MB
2206+
assert_eq!(OpenAiCompatConfig::xai().max_request_body_bytes, 52_428_800);
2207+
// 50MB
22012208
}
22022209

22032210
#[test]

rust/crates/commands/src/lib.rs

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2623,10 +2623,8 @@ fn render_mcp_report_json_for(
26232623
// runs, the existing serializer adds `status: "ok"` below.
26242624
match loader.load() {
26252625
Ok(runtime_config) => {
2626-
let mut value = render_mcp_summary_report_json(
2627-
cwd,
2628-
runtime_config.mcp().servers(),
2629-
);
2626+
let mut value =
2627+
render_mcp_summary_report_json(cwd, runtime_config.mcp().servers());
26302628
if let Some(map) = value.as_object_mut() {
26312629
map.insert("status".to_string(), Value::String("ok".to_string()));
26322630
map.insert("config_load_error".to_string(), Value::Null);

0 commit comments

Comments
 (0)