@@ -151,7 +151,7 @@ fn resolve_sandbox_name(name: Option<String>, gateway: &str) -> Result<String> {
151151 Specify a sandbox name or connect to one first: nav sandbox connect <name>"
152152 )
153153 } ) ?;
154- eprintln ! ( "{} Using sandbox '{}' (last used)" , "→" . bold( ) , last. bold( ) , ) ;
154+ eprintln ! ( "{} Using sandbox '{}' (last used)" , "→" . bold( ) , last. bold( ) ) ;
155155 Ok ( last)
156156}
157157
@@ -816,7 +816,7 @@ enum GatewayCommands {
816816 /// `nvidia.com/gpu` resources. Requires NVIDIA drivers and the
817817 /// NVIDIA Container Toolkit on the host.
818818 ///
819- /// When enabled, OpenShell auto-selects CDI when the Docker daemon has
819+ /// When enabled, ` OpenShell` auto-selects CDI when the Docker daemon has
820820 /// CDI enabled and falls back to Docker's NVIDIA GPU request path
821821 /// (`--gpus all`) otherwise.
822822 #[ arg( long) ]
@@ -1163,7 +1163,7 @@ enum SandboxCommands {
11631163 policy : Option < String > ,
11641164
11651165 /// Forward a local port to the sandbox before the initial command or shell starts.
1166- /// Accepts [bind_address:]port (e.g. 8080, 0.0.0.0:8080). Keeps the sandbox alive.
1166+ /// Accepts [` bind_address` :]port (e.g. 8080, 0.0.0.0:8080). Keeps the sandbox alive.
11671167 #[ arg( long, conflicts_with = "no_keep" ) ]
11681168 forward : Option < String > ,
11691169
@@ -1472,11 +1472,11 @@ enum PolicyCommands {
14721472 #[ arg( long = "remove-endpoint" ) ]
14731473 remove_endpoints : Vec < String > ,
14741474
1475- /// Add a REST allow rule: host:port:METHOD:path_glob.
1475+ /// Add a REST allow rule: ` host:port:METHOD:path_glob` .
14761476 #[ arg( long = "add-allow" ) ]
14771477 add_allow : Vec < String > ,
14781478
1479- /// Add a REST deny rule: host:port:METHOD:path_glob.
1479+ /// Add a REST deny rule: ` host:port:METHOD:path_glob` .
14801480 #[ arg( long = "add-deny" ) ]
14811481 add_deny : Vec < String > ,
14821482
@@ -1556,7 +1556,7 @@ enum PolicyCommands {
15561556 /// Prove properties of a sandbox policy — or find counterexamples.
15571557 #[ command( help_template = LEAF_HELP_TEMPLATE , next_help_heading = "FLAGS" ) ]
15581558 Prove {
1559- /// Path to OpenShell sandbox policy YAML.
1559+ /// Path to ` OpenShell` sandbox policy YAML.
15601560 #[ arg( long, value_hint = ValueHint :: FilePath ) ]
15611561 policy : String ,
15621562
@@ -1646,7 +1646,7 @@ enum ForwardCommands {
16461646 /// Start forwarding a local port to a sandbox.
16471647 #[ command( help_template = LEAF_HELP_TEMPLATE , next_help_heading = "FLAGS" ) ]
16481648 Start {
1649- /// Port to forward: [bind_address:]port (e.g. 8080, 0.0.0.0:8080).
1649+ /// Port to forward: [` bind_address` :]port (e.g. 8080, 0.0.0.0:8080).
16501650 port : String ,
16511651
16521652 /// Sandbox name (defaults to last-used sandbox).
@@ -1675,6 +1675,7 @@ enum ForwardCommands {
16751675}
16761676
16771677#[ tokio:: main]
1678+ #[ allow( clippy:: large_stack_frames) ] // CLI dispatch holds many futures; OK at top level.
16781679async fn main ( ) -> Result < ( ) > {
16791680 // Install the rustls crypto provider before completion runs — completers may
16801681 // establish TLS connections to the gateway.
@@ -1744,7 +1745,7 @@ async fn main() -> Result<()> {
17441745 } else {
17451746 vec ! [ ]
17461747 } ;
1747- run:: gateway_admin_deploy (
1748+ Box :: pin ( run:: gateway_admin_deploy (
17481749 & name,
17491750 remote. as_deref ( ) ,
17501751 ssh_key. as_deref ( ) ,
@@ -1756,7 +1757,7 @@ async fn main() -> Result<()> {
17561757 registry_username. as_deref ( ) ,
17571758 registry_token. as_deref ( ) ,
17581759 gpu,
1759- )
1760+ ) )
17601761 . await ?;
17611762 }
17621763 GatewayCommands :: Stop {
@@ -1873,7 +1874,7 @@ async fn main() -> Result<()> {
18731874 } else {
18741875 println ! ( "{}" , "Gateway Status" . cyan( ) . bold( ) ) ;
18751876 println ! ( ) ;
1876- println ! ( " {} No gateway configured." , "Status:" . dimmed( ) , ) ;
1877+ println ! ( " {} No gateway configured." , "Status:" . dimmed( ) ) ;
18771878 println ! ( ) ;
18781879 println ! (
18791880 "Deploy a gateway with: {}" ,
@@ -1891,16 +1892,15 @@ async fn main() -> Result<()> {
18911892 ForwardCommands :: Stop { port, name } => {
18921893 let name = match name {
18931894 Some ( n) => n,
1894- None => match run :: find_forward_by_port ( port ) ? {
1895- Some ( n) => {
1895+ None => {
1896+ if let Some ( n) = run :: find_forward_by_port ( port ) ? {
18961897 eprintln ! ( "→ Found forward on sandbox '{n}'" ) ;
18971898 n
1898- }
1899- None => {
1900- eprintln ! ( "{} No active forward found for port {port}" , "!" . yellow( ) , ) ;
1899+ } else {
1900+ eprintln ! ( "{} No active forward found for port {port}" , "!" . yellow( ) ) ;
19011901 return Ok ( ( ) ) ;
19021902 }
1903- } ,
1903+ }
19041904 } ;
19051905 if run:: stop_forward ( & name, port) ? {
19061906 eprintln ! (
@@ -3280,7 +3280,7 @@ mod tests {
32803280 } ) ;
32813281 }
32823282
3283- /// Verify the flag names the TUI uses to build its ProxyCommand are
3283+ /// Verify the flag names the TUI uses to build its ` ProxyCommand` are
32843284 /// accepted by the `SshProxy` subcommand and land in the right fields.
32853285 /// This catches drift when CLI flags are renamed or restructured.
32863286 #[ test]
0 commit comments