1pub const FAILED_TO_SAVE: &str = "Failed to save";
11pub fn failed_to_save(e: &impl std::fmt::Display) -> String {
12 format!("{}: {}", FAILED_TO_SAVE, e)
13}
14
15pub const CONFIG_CHANGED_EXTERNALLY: &str =
16 "Config changed externally. Press Esc and re-open to pick up changes.";
17
18pub const DEMO_CONNECTION_DISABLED: &str = "Demo mode. Connection disabled.";
21pub const DEMO_SYNC_DISABLED: &str = "Demo mode. Sync disabled.";
22pub const DEMO_TUNNELS_DISABLED: &str = "Demo mode. Tunnels disabled.";
23pub const DEMO_VAULT_SIGNING_DISABLED: &str = "Demo mode. Vault SSH signing disabled.";
24pub const DEMO_FILE_BROWSER_DISABLED: &str = "Demo mode. File browser disabled.";
25pub const DEMO_CONTAINER_REFRESH_DISABLED: &str = "Demo mode. Container refresh disabled.";
26pub const DEMO_CONTAINER_ACTIONS_DISABLED: &str = "Demo mode. Container actions disabled.";
27pub const DEMO_EXECUTION_DISABLED: &str = "Demo mode. Execution disabled.";
28pub const DEMO_PROVIDER_CHANGES_DISABLED: &str = "Demo mode. Provider config changes disabled.";
29
30pub fn stale_host(hint: &str) -> String {
37 let trimmed = hint.trim().trim_end_matches('.');
38 if trimmed.is_empty() {
39 "Stale host.".to_string()
40 } else {
41 format!("Stale host. {}.", trimmed)
42 }
43}
44
45pub fn copied_ssh_command(alias: &str) -> String {
48 format!("Copied SSH command for {}.", alias)
49}
50
51pub fn copied_config_block(alias: &str) -> String {
52 format!("Copied config block for {}.", alias)
53}
54
55pub fn showing_unreachable(count: usize) -> String {
56 format!(
57 "Showing {} unreachable host{}.",
58 count,
59 if count == 1 { "" } else { "s" }
60 )
61}
62
63pub fn sorted_by(label: &str) -> String {
64 format!("Sorted by {}.", label)
65}
66
67pub fn sorted_by_save_failed(label: &str, e: &impl std::fmt::Display) -> String {
68 format!("Sorted by {}. (save failed: {})", label, e)
69}
70
71pub fn grouped_by(label: &str) -> String {
72 format!("Grouped by {}.", label)
73}
74
75pub fn grouped_by_save_failed(label: &str, e: &impl std::fmt::Display) -> String {
76 format!("Grouped by {}. (save failed: {})", label, e)
77}
78
79pub const UNGROUPED: &str = "Ungrouped.";
80
81pub fn ungrouped_save_failed(e: &impl std::fmt::Display) -> String {
82 format!("Ungrouped. (save failed: {})", e)
83}
84
85pub const GROUPED_BY_TAG: &str = "Grouped by tag.";
86
87pub fn grouped_by_tag_save_failed(e: &impl std::fmt::Display) -> String {
88 format!("Grouped by tag. (save failed: {})", e)
89}
90
91pub fn host_restored(alias: &str) -> String {
92 format!("{} is back from the dead.", alias)
93}
94
95pub fn restored_tags(count: usize) -> String {
96 format!(
97 "Restored tags on {} host{}.",
98 count,
99 if count == 1 { "" } else { "s" }
100 )
101}
102
103pub const NOTHING_TO_UNDO: &str = "Nothing to undo.";
104pub const NO_IMPORTABLE_HOSTS: &str = "No importable hosts in known_hosts.";
105pub const NO_STALE_HOSTS: &str = "No stale hosts.";
106pub const NO_HOST_SELECTED: &str = "No host selected.";
107pub const NO_HOSTS_TO_RUN: &str = "No hosts to run on.";
108pub const NO_HOSTS_TO_TAG: &str = "No hosts to tag.";
109pub const PING_FIRST: &str = "Ping first (p/P), then filter with !.";
110pub const PINGING_ALL: &str = "Pinging all the things...";
111pub const ESC_QUIT_HINT: &str = "Nothing to cancel. Press q to quit.";
112
113pub fn included_file_edit(name: &str) -> String {
114 format!("{} is in an included file. Edit it there.", name)
115}
116
117pub fn included_file_delete(name: &str) -> String {
118 format!("{} is in an included file. Delete it there.", name)
119}
120
121pub fn included_file_clone(name: &str) -> String {
122 format!("{} is in an included file. Clone it there.", name)
123}
124
125pub fn included_host_lives_in(alias: &str, path: &impl std::fmt::Display) -> String {
126 format!("{} lives in {}. Edit it there.", alias, path)
127}
128
129pub fn included_host_clone_there(alias: &str, path: &impl std::fmt::Display) -> String {
130 format!("{} lives in {}. Clone it there.", alias, path)
131}
132
133pub fn included_host_tag_there(alias: &str, path: &impl std::fmt::Display) -> String {
134 format!("{} is included from {}. Tag it there.", alias, path)
135}
136
137pub const HOST_NOT_FOUND_IN_CONFIG: &str = "Host not found in config.";
138
139pub const SMART_PARSED: &str = "Smart-parsed that for you. Check the fields.";
142pub const LOOKS_LIKE_ADDRESS: &str = "Looks like an address. Suggested as Host.";
143
144pub const HOST_ALIAS_EMPTY: &str = "Alias can't be empty. Every host needs a name!";
152pub const HOST_PATTERN_EMPTY: &str = "Pattern can't be empty.";
153pub const HOST_PATTERN_NEEDS_WILDCARD: &str =
154 "Pattern needs a wildcard (*, ?, [) or multiple hosts.";
155pub const HOST_ALIAS_WHITESPACE: &str = "Alias can't contain whitespace. Keep it simple.";
156pub const HOST_ALIAS_HASH: &str =
157 "Alias can't contain '#'. That's a comment character in SSH config.";
158pub const HOST_ALIAS_PATTERN_CHARS: &str =
159 "Alias can't contain pattern characters. That creates a match pattern, not a host.";
160pub const HOST_HOSTNAME_EMPTY: &str = "Hostname can't be empty. Where should we connect to?";
161pub const HOST_HOSTNAME_WHITESPACE: &str = "Hostname can't contain whitespace.";
162pub const HOST_PORT_INVALID: &str = "That's not a port number. Ports are 1-65535, not poetry.";
163pub const HOST_PORT_ZERO: &str = "Port 0? Bold choice, but no. Try 1-65535.";
164pub const HOST_VAULT_ROLE_INVALID: &str = "Vault SSH role: only letters, digits, /, _ and - \
165 are allowed (e.g. ssh-client-signer/sign/my-role).";
166pub const HOST_VAULT_ADDR_INVALID: &str = "Vault SSH address: must be a non-empty URL \
167 without spaces or control characters (e.g. http://127.0.0.1:8200).";
168
169pub fn field_control_chars(name: &str) -> String {
172 format!(
173 "{} contains control characters. That's not going to work.",
174 name
175 )
176}
177
178pub const TUNNEL_BIND_PORT_INVALID: &str = "Bind port must be 1-65535.";
181pub const TUNNEL_BIND_PORT_ZERO: &str = "Bind port can't be 0.";
182pub const TUNNEL_REMOTE_HOST_EMPTY: &str = "Remote host can't be empty.";
183pub const TUNNEL_REMOTE_HOST_SPACES: &str = "Remote host can't contain spaces.";
184pub const TUNNEL_REMOTE_PORT_INVALID: &str = "Remote port must be 1-65535.";
185pub const TUNNEL_REMOTE_PORT_ZERO: &str = "Remote port can't be 0.";
186
187pub fn field_control_chars_short(name: &str) -> String {
190 format!("{} contains control characters.", name)
191}
192
193pub const SNIPPET_NAME_EMPTY: &str = "Snippet name cannot be empty.";
196pub const SNIPPET_NAME_WHITESPACE: &str =
197 "Snippet name cannot have leading or trailing whitespace.";
198pub const SNIPPET_NAME_INVALID_CHARS: &str = "Snippet name cannot contain #, [ or ].";
199pub const SNIPPET_NAME_CONTROL_CHARS: &str = "Snippet name cannot contain control characters.";
200pub const SNIPPET_COMMAND_EMPTY: &str = "Command cannot be empty.";
201pub const SNIPPET_COMMAND_CONTROL_CHARS: &str = "Command cannot contain control characters.";
202pub const SNIPPET_DESCRIPTION_CONTROL_CHARS: &str = "Description contains control characters.";
203
204pub fn pattern_already_exists(alias: &str) -> String {
207 format!("Pattern '{}' already exists.", alias)
208}
209
210pub fn host_alias_already_exists(alias: &str) -> String {
211 format!("'{}' already exists. Aliases must be unique.", alias)
212}
213
214pub const PATTERN_NO_LONGER_EXISTS: &str = "Pattern no longer exists.";
215pub const HOST_NO_LONGER_EXISTS: &str = "Host no longer exists.";
216
217pub fn cert_path_resolve_failed(e: &impl std::fmt::Display) -> String {
218 format!("Failed to resolve cert path: {}", e)
219}
220
221pub fn welcome_aboard(alias: &str) -> String {
224 format!("Welcome aboard, {}!", alias)
225}
226
227pub const BULK_TAG_NO_HOSTS_SELECTED: &str = "No hosts selected.";
230
231pub fn goodbye_host(alias: &str) -> String {
234 format!("Goodbye, {}. We barely knew ye. (u to undo)", alias)
235}
236
237pub fn host_not_found(alias: &str) -> String {
238 format!("Host '{}' not found.", alias)
239}
240
241pub fn siblings_stripped(alias: &str, sibling_count: usize) -> String {
245 if sibling_count == 1 {
246 format!(
247 "Stripped {}. 1 sibling alias kept its shared config.",
248 alias
249 )
250 } else {
251 format!(
252 "Stripped {}. {} sibling aliases kept their shared config.",
253 alias, sibling_count
254 )
255 }
256}
257
258pub fn confirm_delete_siblings_note(siblings: &[String]) -> String {
262 let shown: Vec<&str> = siblings.iter().take(3).map(String::as_str).collect();
263 let tail = if siblings.len() > shown.len() {
264 format!(" +{} more", siblings.len() - shown.len())
265 } else {
266 String::new()
267 };
268 format!("Siblings kept: {}{}", shown.join(", "), tail)
269}
270
271pub fn cert_cleanup_warning(path: &impl std::fmt::Display, e: &impl std::fmt::Display) -> String {
272 format!("Warning: failed to clean up Vault SSH cert {}: {}", path, e)
273}
274
275pub const CLONED_VAULT_CLEARED: &str = "Cloned. Vault SSH role cleared on copy.";
278
279pub const TUNNEL_REMOVED: &str = "Tunnel removed.";
282pub const TUNNEL_SAVED: &str = "Tunnel saved.";
283pub const TUNNEL_NOT_FOUND: &str = "Tunnel not found in config.";
284pub const TUNNEL_INCLUDED_READ_ONLY: &str = "Included host. Tunnels are read-only.";
285pub const TUNNEL_ORIGINAL_NOT_FOUND: &str = "Original tunnel not found in config.";
286pub const TUNNEL_LIST_CHANGED: &str = "Tunnel list changed externally. Press Esc and re-open.";
287pub const TUNNEL_DUPLICATE: &str = "Duplicate tunnel already configured.";
288pub const TUNNEL_NO_EDITABLE_HOSTS: &str = "No editable hosts. Add a host first.";
289pub const TUNNEL_HOST_PICKER_NO_MATCH: &str = "No matches.";
290
291pub fn tunnel_stopped(alias: &str) -> String {
292 format!("Tunnel for {} stopped.", alias)
293}
294
295pub fn tunnel_started(alias: &str) -> String {
296 format!("Tunnel for {} started.", alias)
297}
298
299pub fn tunnel_start_failed(e: &impl std::fmt::Display) -> String {
300 format!("Failed to start tunnel: {}", e)
301}
302
303pub fn pinging_host(alias: &str, show_hint: bool) -> String {
306 if show_hint {
307 format!("Pinging {}... (Shift+P pings all)", alias)
308 } else {
309 format!("Pinging {}...", alias)
310 }
311}
312
313pub fn bastion_not_found(alias: &str) -> String {
314 format!("Bastion {} not found in config.", alias)
315}
316
317pub fn provider_removed(display_name: &str) -> String {
320 format!(
321 "Removed {} configuration. Synced hosts remain in your SSH config.",
322 display_name
323 )
324}
325
326pub fn label_invalid(reason: &str) -> String {
327 format!("Invalid name: {}", reason)
328}
329
330pub const LABEL_MUST_DIFFER: &str = "The two names must be different.";
331
332pub const LABEL_MIGRATION_FIELD_CURRENT: &str = " Name for your current config ";
333pub const LABEL_MIGRATION_FIELD_NEW: &str = " Name for the new config ";
334
335pub fn confirm_remove_provider(display: &str) -> String {
336 format!(" Remove {}? ", display)
337}
338
339pub fn confirm_remove_labeled_config(display: &str, label: &str) -> String {
340 format!(" Remove {} ({})? ", display, label)
341}
342
343pub const EXPAND_TO_REMOVE_CONFIG: &str =
344 "Expand the provider and pick a specific config to remove.";
345
346pub fn provider_not_configured(display_name: &str) -> String {
347 format!("{} is not configured. Nothing to remove.", display_name)
348}
349
350pub fn provider_configure_first(display_name: &str) -> String {
351 format!("Configure {} first. Press Enter to set up.", display_name)
352}
353
354pub fn provider_saved_syncing(display_name: &str) -> String {
355 format!("Saved {} configuration. Syncing...", display_name)
356}
357
358pub fn provider_saved(display_name: &str) -> String {
359 format!("Saved {} configuration.", display_name)
360}
361
362pub fn no_stale_hosts_for(display_name: &str) -> String {
363 format!("No stale hosts for {}.", display_name)
364}
365
366pub fn contains_control_chars(name: &str) -> String {
367 format!("{} contains control characters.", name)
368}
369
370pub const TOKEN_FORMAT_AWS: &str = "Token format: AccessKeyId:SecretAccessKey";
371pub const URL_REQUIRED_PROXMOX: &str = "URL is required for Proxmox VE.";
372pub const PROJECT_REQUIRED_GCP: &str = "Project ID can't be empty. Set your GCP project ID.";
373pub const COMPARTMENT_REQUIRED_OCI: &str =
374 "Compartment can't be empty. Set your OCI compartment OCID.";
375pub const REGIONS_REQUIRED_AWS: &str = "Select at least one AWS region.";
376pub const ZONES_REQUIRED_SCALEWAY: &str = "Select at least one Scaleway zone.";
377pub const SUBSCRIPTIONS_REQUIRED_AZURE: &str = "Enter at least one Azure subscription ID.";
378pub const ALIAS_PREFIX_INVALID: &str =
379 "Alias prefix can't contain spaces or pattern characters (*, ?, [, !).";
380pub const USER_NO_WHITESPACE: &str = "User can't contain whitespace.";
381pub const VAULT_ROLE_FORMAT: &str = "Vault SSH role must be in the form <mount>/sign/<role>.";
382
383pub const PROVIDER_CONFIG_CHANGED_EXTERNALLY: &str =
384 "Provider config changed externally. Press Esc and re-open to pick up changes.";
385pub const PROVIDER_URL_REQUIRES_HTTPS: &str =
386 "URL must start with https://. Toggle Verify TLS off for self-signed certificates.";
387pub const PROVIDER_TOKEN_REQUIRED_GCP: &str =
388 "Token can't be empty. Provide a service account JSON key file path or access token.";
389pub const PROVIDER_TOKEN_REQUIRED_ORACLE: &str =
390 "Token can't be empty. Provide the path to your OCI config file (e.g. ~/.oci/config).";
391
392pub fn provider_token_required(display_name: &str) -> String {
393 format!(
394 "Token can't be empty. Grab one from your {} dashboard.",
395 display_name
396 )
397}
398
399pub fn azure_subscription_id_invalid(sub: &str) -> String {
400 format!(
401 "Invalid subscription ID '{}'. Expected UUID format \
402 (e.g. 12345678-1234-1234-1234-123456789012).",
403 sub
404 )
405}
406
407pub const VAULT_SIGNING_CANCELLED: &str = "Vault SSH signing cancelled.";
410
411pub fn vault_signing_aborted(failed: u32, last_error: Option<&str>) -> String {
416 format!(
417 "Vault SSH signing aborted after {} consecutive failures. Press V to retry. Last error: {}",
418 failed,
419 last_error.unwrap_or("unknown")
420 )
421}
422
423pub fn bulk_tag_apply_status(
431 changed_hosts: usize,
432 added: usize,
433 removed: usize,
434 skipped_included: usize,
435) -> String {
436 let mut parts: Vec<String> = Vec::new();
437 if changed_hosts > 0 {
438 let host_word = if changed_hosts == 1 { "" } else { "s" };
439 let mut head = format!("Updated {} host{}", changed_hosts, host_word);
440 let mut delta = Vec::new();
441 if added > 0 {
442 delta.push(format!("+{}", added));
443 }
444 if removed > 0 {
445 delta.push(format!("-{}", removed));
446 }
447 if !delta.is_empty() {
448 head = format!("{} ({})", head, delta.join(" "));
449 }
450 parts.push(head);
451 }
452 if skipped_included > 0 {
453 let file_word = if skipped_included == 1 { "" } else { "s" };
454 parts.push(format!(
455 "skipped {} in include file{}",
456 skipped_included, file_word
457 ));
458 }
459 parts.join(". ")
460}
461
462pub fn vault_sign_summary(
463 signed: u32,
464 failed: u32,
465 skipped: u32,
466 first_error: Option<&str>,
467) -> String {
468 let total = signed + failed + skipped;
469 let cert_word = if total == 1 {
470 "certificate"
471 } else {
472 "certificates"
473 };
474 if failed > 0 {
475 if let Some(err) = first_error {
476 if total == 1 {
477 return err.to_string();
478 }
479 format!(
480 "Signed {} of {} {}. {} failed: {}",
481 signed, total, cert_word, failed, err
482 )
483 } else {
484 format!(
485 "Signed {} of {} {}. {} failed",
486 signed, total, cert_word, failed
487 )
488 }
489 } else if skipped > 0 && signed == 0 {
490 format!(
491 "All {} {} already valid. Nothing to sign.",
492 total, cert_word
493 )
494 } else if skipped > 0 {
495 format!(
496 "Signed {} of {} {}. {} already valid.",
497 signed, total, cert_word, skipped
498 )
499 } else {
500 format!("Signed {} of {} {}.", signed, total, cert_word)
501 }
502}
503pub const VAULT_NO_ROLE_CONFIGURED: &str = "No Vault SSH role configured. Set one in the host form \
504 (Vault SSH role field) or on a provider for shared defaults.";
505pub const VAULT_NO_HOSTS_WITH_ROLE: &str = "No hosts with a Vault SSH role configured.";
506pub const VAULT_ALL_CERTS_VALID: &str = "All Vault SSH certificates are still valid.";
507pub const VAULT_NO_ADDRESS: &str = "No Vault address set. Edit the host (e) or provider \
508 and fill in the Vault SSH Address field.";
509
510pub fn vault_error(msg: &str) -> String {
511 format!("Vault SSH: {}", msg)
512}
513
514pub fn vault_signed(alias: &str) -> String {
515 format!("Signed Vault SSH cert for {}", alias)
516}
517
518pub fn vault_sign_failed(alias: &str, message: &str) -> String {
519 format!("Vault SSH: failed to sign {}: {}", alias, message)
520}
521
522pub fn vault_signing_progress(spinner: &str, done: usize, total: usize, alias: &str) -> String {
523 format!(
524 "{} Signing {}/{}: {} (V to cancel)",
525 spinner, done, total, alias
526 )
527}
528
529pub fn vault_cert_saved_host_gone(alias: &str) -> String {
530 format!(
531 "Vault SSH cert saved for {} but host no longer in config \
532 (renamed or deleted). CertificateFile NOT written.",
533 alias
534 )
535}
536
537pub fn vault_spawn_failed(e: &impl std::fmt::Display) -> String {
538 format!("Vault SSH: failed to spawn signing thread: {}", e)
539}
540
541pub fn vault_cert_check_failed(alias: &str, message: &str) -> String {
542 format!("Cert check failed for {}: {}", alias, message)
543}
544
545pub fn vault_role_set(role: &str) -> String {
546 format!("Vault SSH role set to {}.", role)
547}
548
549pub fn vault_signed_pre_connect(alias: &str) -> String {
553 format!("Signed Vault SSH cert for {}.", alias)
554}
555
556pub fn vault_signed_pre_connect_chain(target: &str, count: usize) -> String {
561 if count <= 1 {
562 format!("Signed Vault SSH cert for {}.", target)
563 } else {
564 format!("Signed Vault SSH certs for {} ({} hosts).", target, count)
565 }
566}
567
568pub fn vault_sign_failed_pre_connect(alias: &str, message: &str) -> String {
573 format!("Vault SSH signing failed for {}: {}", alias, message)
574}
575
576pub fn vault_cert_pubkey_resolve_failed(e: &impl std::fmt::Display) -> String {
580 format!("Vault SSH cert failed: {}", e)
581}
582
583pub fn vault_cert_host_block_missing(alias: &str, cert_path: &std::path::Path) -> String {
588 format!(
589 "Warning: signed cert for {} but host block is no longer in ssh config; \
590 CertificateFile not written (cert saved to {})",
591 alias,
592 cert_path.display()
593 )
594}
595
596pub fn vault_cert_config_write_failed(alias: &str, e: &impl std::fmt::Display) -> String {
599 format!(
600 "Warning: signed cert for {} but failed to update SSH config CertificateFile: {}",
601 alias, e
602 )
603}
604
605pub fn snippet_removed(name: &str) -> String {
608 format!("Removed snippet '{}'.", name)
609}
610
611pub fn snippet_added(name: &str) -> String {
612 format!("Added snippet '{}'.", name)
613}
614
615pub fn snippet_updated(name: &str) -> String {
616 format!("Updated snippet '{}'.", name)
617}
618
619pub fn snippet_exists(name: &str) -> String {
620 format!("'{}' already exists.", name)
621}
622
623pub const OUTPUT_COPIED: &str = "Output copied.";
624
625pub fn copy_failed(e: &impl std::fmt::Display) -> String {
626 format!("Copy failed: {}", e)
627}
628
629pub fn clipboard_run_failed(cmd: &str) -> String {
635 format!("Failed to run {}.", cmd)
636}
637
638pub fn clipboard_write_failed(cmd: &str) -> String {
639 format!("Failed to write to {}.", cmd)
640}
641
642pub fn clipboard_wait_failed(cmd: &str) -> String {
643 format!("Failed to wait for {}.", cmd)
644}
645
646pub fn clipboard_exited_error(cmd: &str) -> String {
647 format!("{} exited with error.", cmd)
648}
649
650pub fn import_open_failed(path: &impl std::fmt::Display, e: &impl std::fmt::Display) -> String {
656 format!("Can't open {}: {}", path, e)
657}
658
659pub fn import_known_hosts_open_failed(e: &impl std::fmt::Display) -> String {
660 format!("Can't open known_hosts: {}", e)
661}
662
663pub const IMPORT_HOME_DIR_UNKNOWN: &str = "Could not determine home directory.";
664pub const IMPORT_KNOWN_HOSTS_MISSING: &str = "~/.ssh/known_hosts not found.";
665
666pub fn snippet_ssh_launch_failed(e: &impl std::fmt::Display) -> String {
669 format!("Failed to launch ssh: {}", e)
670}
671
672pub fn vault_create_dir_failed(path: &impl std::fmt::Display) -> String {
679 format!("Failed to create {}", path)
680}
681
682pub fn vault_write_cert_failed(path: &impl std::fmt::Display) -> String {
683 format!("Failed to write certificate to {}", path)
684}
685
686pub fn vault_ssh_keygen_run_failed(e: &impl std::fmt::Display) -> String {
687 format!("Failed to run ssh-keygen: {}", e)
688}
689
690pub const CONTAINER_ID_EMPTY: &str = "Container ID must not be empty.";
697pub const CONTAINER_RUNTIME_MISSING: &str = "No container runtime found. Install Docker or Podman.";
698
699pub fn container_id_invalid_char(c: char) -> String {
700 format!("Container ID contains invalid character: '{c}'")
701}
702
703pub fn container_unknown_sentinel(s: &str) -> String {
704 format!("Unknown sentinel: {s}")
705}
706
707pub fn container_invalid_id(reason: &str) -> String {
708 format!("Container exec blocked: {reason}")
709}
710
711pub fn scp_copying_one(source: &str) -> String {
714 format!("Copying {}...", source)
715}
716
717pub fn scp_copying_many(count: usize) -> String {
720 format!("Copying {} files...", count)
721}
722
723pub fn scp_failed_exit_code(code: i32) -> String {
726 format!("Copy failed (exit code {}).", code)
727}
728
729pub fn scp_spawn_failed(e: &impl std::fmt::Display) -> String {
733 format!("scp failed: {}", e)
734}
735
736pub const GLOBAL_DEFAULT_CLEARED: &str = "Global default cleared.";
739pub const PASSWORD_SOURCE_CLEARED: &str = "Password source cleared.";
740pub const ASKPASS_CUSTOM_COMMAND_HINT: &str =
741 "Type your command. Use %a (alias) and %h (hostname) as placeholders.";
742
743pub fn global_default_set(label: &str) -> String {
744 format!("Global default set to {}.", label)
745}
746
747pub fn password_source_set(label: &str) -> String {
748 format!("Password source set to {}.", label)
749}
750
751pub fn complete_path(label: &str) -> String {
752 format!("Complete the {} path.", label)
753}
754
755pub fn key_selected(name: &str) -> String {
756 format!("Locked and loaded with {}.", name)
757}
758
759pub fn proxy_jump_set(alias: &str) -> String {
760 format!("Jumping through {}.", alias)
761}
762
763pub fn save_default_failed(e: &impl std::fmt::Display) -> String {
764 format!("Failed to save default: {}", e)
765}
766
767pub fn container_action_complete(action: &str) -> String {
770 format!("Container {} complete.", action)
771}
772
773pub const HOST_KEY_UNKNOWN: &str = "Host key unknown. Connect first (Enter) to trust the host.";
774pub const HOST_KEY_CHANGED: &str =
775 "Host key changed. Possible tampering or server re-install. Clear with ssh-keygen -R.";
776
777pub const CONTAINER_RUNTIME_NOT_FOUND: &str = "Docker or Podman not found on remote host.";
781pub const CONTAINER_PERMISSION_DENIED: &str =
782 "Permission denied. Is your user in the docker group?";
783pub const CONTAINER_DAEMON_NOT_RUNNING: &str = "Container daemon is not running.";
784pub const CONTAINER_CONNECTION_REFUSED: &str = "Connection refused.";
785pub const CONTAINER_HOST_UNREACHABLE: &str = "Host unreachable.";
786
787pub fn container_command_failed(code: i32) -> String {
791 format!("Command failed with code {}.", code)
792}
793
794pub const CONTAINER_INSPECT_EMPTY: &str = "Inspect returned no data.";
796
797pub fn container_inspect_parse_failed(reason: &str) -> String {
799 format!("Inspect parse failed: {}", reason)
800}
801
802pub fn container_not_running(name: &str) -> String {
806 format!("{} is not running. Cannot exec.", name)
807}
808
809pub const DEMO_CONTAINER_EXEC_DISABLED: &str = "Demo mode: container exec disabled.";
811
812pub fn container_exec_opened_in_tmux(name: &str, alias: &str) -> String {
814 format!("Opened {} on {} in tmux window.", name, alias)
815}
816
817pub fn container_exec_ended(name: &str) -> String {
819 format!("Container shell ended: {}.", name)
820}
821
822pub fn container_exec_failed_with_reason(name: &str, reason: &str) -> String {
824 format!("Container exec failed for {}: {}", name, reason)
825}
826
827pub fn container_exec_exited_with_code(name: &str, code: i32) -> String {
829 format!("Container exec for {} exited with code {}.", name, code)
830}
831
832pub fn container_exec_spawn_failed(name: &str) -> String {
834 format!("Failed to launch ssh for container {}.", name)
835}
836
837pub const CONTAINER_EXEC_INVALID_COMMAND: &str =
839 "Command rejected: control characters not allowed.";
840
841pub const CONTAINER_LOGS_LOADING: &str = "fetching logs…";
845
846pub fn container_logs_fetched(secs_ago: u64) -> String {
849 format!(
850 "fetched {} ago",
851 crate::containers::format_uptime_short(secs_ago)
852 )
853}
854
855pub fn container_logs_failed(reason: &str) -> String {
857 format!("logs fetch failed: {}", reason)
858}
859
860pub const CONTAINER_RESTART_BODY: &str =
864 "Sends SIGTERM, waits 10s, then SIGKILL. Live connections will drop.";
865pub const CONTAINER_STOP_BODY: &str = "Sends SIGTERM, waits 10s, then SIGKILL. Container will not restart unless its policy reschedules it.";
866
867pub fn container_stack_unknown(name: &str) -> String {
870 format!("Stack unknown for {}: open the detail panel first.", name)
871}
872
873pub fn container_stack_no_running(project: &str) -> String {
874 format!("Stack {} has no running members to restart.", project)
875}
876
877pub const CONTAINER_STACK_RESTART_BODY: &str = "Restart cycles every running member one by one. Exited members are not touched. Live connections will drop.";
878
879pub const CONTAINER_HOST_RESTART_ALL_BODY: &str = "Restart cycles every running container on the host one by one. Exited containers are not touched. Live connections will drop.";
885
886pub const CONTAINER_HOST_STOP_ALL_BODY: &str = "Stops every running container on the host one by one. Exited containers are not touched. Restart policies may reschedule them.";
888
889pub fn container_action_needs_single(action: &str) -> String {
895 format!(
896 "{} need a single container. Place the cursor on a container row.",
897 action.to_lowercase()
898 )
899}
900
901pub fn container_host_no_running(alias: &str) -> String {
903 format!("No running containers on {}.", alias)
904}
905
906pub fn container_refreshing(alias: &str) -> String {
910 format!("Refreshing {}…", alias)
911}
912
913pub const REFRESH_BATCH_ALREADY_RUNNING: &str = "Refresh already in progress.";
915
916pub const REFRESH_NOTHING_TO_REFRESH: &str = "No cached hosts to refresh. Press 'a' to add a host.";
918
919pub fn container_refresh_progress(done: usize, total: usize) -> String {
921 format!("Refreshing {}/{} hosts…", done, total)
922}
923
924pub fn container_refresh_complete(total: usize) -> String {
926 format!(
927 "Refreshed {} host{}.",
928 total,
929 if total == 1 { "" } else { "s" }
930 )
931}
932
933pub const CONTAINER_HOST_PICKER_NO_MATCH: &str = "No hosts match.";
935
936pub const CONTAINER_HOST_PICKER_NOTHING_TO_ADD: &str =
938 "All hosts already cached. Use 'r' or 'R' to refresh.";
939
940pub fn imported_hosts(imported: usize, skipped: usize) -> String {
943 format!(
944 "Imported {} host{}, skipped {} duplicate{}.",
945 imported,
946 if imported == 1 { "" } else { "s" },
947 skipped,
948 if skipped == 1 { "" } else { "s" }
949 )
950}
951
952pub fn all_hosts_exist(skipped: usize) -> String {
953 if skipped == 1 {
954 "Host already exists.".to_string()
955 } else {
956 format!("All {} hosts already exist.", skipped)
957 }
958}
959
960pub fn config_repaired(groups: usize, orphaned: usize) -> String {
963 format!(
964 "Repaired SSH config ({} absorbed, {} orphaned group headers).",
965 groups, orphaned
966 )
967}
968
969pub fn no_exact_match(alias: &str) -> String {
970 format!("No exact match for '{}'. Here's what we found.", alias)
971}
972
973pub fn group_pref_reset_failed(e: &impl std::fmt::Display) -> String {
974 format!("Group preference reset. (save failed: {})", e)
975}
976
977pub fn opened_in_tmux(alias: &str) -> String {
980 format!("Opened {} in new tmux window.", alias)
981}
982
983pub fn tmux_error(e: &impl std::fmt::Display) -> String {
984 format!("tmux: {}", e)
985}
986
987pub fn connection_failed(alias: &str) -> String {
988 format!("Connection to {} failed.", alias)
989}
990
991pub fn connection_spawn_failed(e: &impl std::fmt::Display) -> String {
995 format!("Connection failed: {}", e)
996}
997
998pub fn ssh_failed_with_reason(alias: &str, reason: &str) -> String {
1001 format!("SSH to {} failed. {}", alias, reason)
1002}
1003
1004pub fn ssh_exited_with_code(alias: &str, code: i32) -> String {
1007 format!("SSH to {} exited with code {}.", alias, code)
1008}
1009
1010pub fn host_key_remove_failed(stderr: &str) -> String {
1013 format!("Failed to remove host key: {}", stderr)
1014}
1015
1016pub fn ssh_keygen_failed(e: &impl std::fmt::Display) -> String {
1017 format!("Failed to run ssh-keygen: {}", e)
1018}
1019
1020pub const TRANSFER_COMPLETE: &str = "Transfer complete.";
1023
1024pub fn provider_progress(spinner: &str, name: &str, message: &str) -> String {
1033 format!("{} {}: {}", spinner, name, message)
1034}
1035
1036pub const AGE_JUST_NOW: &str = "just now";
1039
1040pub fn relative_age(elapsed: std::time::Duration) -> String {
1044 let secs = elapsed.as_secs();
1045 if secs < 5 {
1046 AGE_JUST_NOW.to_string()
1047 } else if secs < 60 {
1048 format!("{}s ago", secs)
1049 } else if secs < 3600 {
1050 format!("{}m ago", secs / 60)
1051 } else if secs < 86400 {
1052 format!("{}h ago", secs / 3600)
1053 } else {
1054 format!("{}d ago", secs / 86400)
1055 }
1056}
1057
1058pub fn vault_config_reapply_failed(signed: usize, e: &impl std::fmt::Display) -> String {
1061 format!(
1062 "External edits detected; signed {} certs but failed to re-apply CertificateFile: {}",
1063 signed, e
1064 )
1065}
1066
1067pub fn vault_external_edits_merged(summary: &str, reapplied: usize) -> String {
1068 format!(
1069 "{} External ssh config edits detected, merged {} CertificateFile directives.",
1070 summary, reapplied
1071 )
1072}
1073
1074pub fn vault_external_edits_no_write(summary: &str) -> String {
1075 format!(
1076 "{} External ssh config edits detected; certs on disk, no CertificateFile written.",
1077 summary
1078 )
1079}
1080
1081pub fn vault_reparse_failed(signed: usize, e: &impl std::fmt::Display) -> String {
1082 format!(
1083 "Signed {} certs but cannot re-parse ssh config after external edit: {}. \
1084 Certs are on disk under ~/.purple/certs/.",
1085 signed, e
1086 )
1087}
1088
1089pub fn vault_config_update_failed(signed: usize, e: &impl std::fmt::Display) -> String {
1090 format!(
1091 "Signed {} certs but failed to update SSH config: {}",
1092 signed, e
1093 )
1094}
1095
1096pub fn vault_config_write_after_sign(e: &impl std::fmt::Display) -> String {
1097 format!("Failed to update config after vault signing: {}", e)
1098}
1099
1100pub fn removed_host_key(hostname: &str) -> String {
1105 format!("Removed host key for {}. Reconnecting...", hostname)
1106}
1107
1108pub fn tagged_host(alias: &str, count: usize) -> String {
1111 format!(
1112 "Tagged {} with {} label{}.",
1113 alias,
1114 count,
1115 if count == 1 { "" } else { "s" }
1116 )
1117}
1118
1119pub fn config_reloaded(count: usize) -> String {
1122 format!("Config reloaded. {} hosts.", count)
1123}
1124
1125pub fn synced_progress(
1141 spinner: &str,
1142 active_names: &str,
1143 done: usize,
1144 total: usize,
1145 added: usize,
1146 updated: usize,
1147 stale: usize,
1148) -> String {
1149 debug_assert!(
1150 !active_names.is_empty(),
1151 "synced_progress must only be called while a provider is still in flight"
1152 );
1153 let diff = sync_diff_suffix(added, updated, stale);
1154 format!(
1155 "{} Syncing {} \u{00B7} {}/{}{}",
1156 spinner, active_names, done, total, diff
1157 )
1158}
1159
1160pub fn synced_done(
1165 done: usize,
1166 total: usize,
1167 names: &str,
1168 added: usize,
1169 updated: usize,
1170 stale: usize,
1171) -> String {
1172 let diff = sync_diff_suffix(added, updated, stale);
1173 format!("Synced {}/{} \u{00B7} {}{}", done, total, names, diff)
1174}
1175
1176fn sync_diff_suffix(added: usize, updated: usize, stale: usize) -> String {
1177 let parts: Vec<String> = [(added, '+'), (updated, '~'), (stale, '-')]
1178 .iter()
1179 .filter(|(n, _)| *n > 0)
1180 .map(|(n, sign)| format!("{}{}", sign, n))
1181 .collect();
1182 if parts.is_empty() {
1183 String::new()
1184 } else {
1185 format!(" ({})", parts.join(" "))
1186 }
1187}
1188
1189pub const SYNC_THREAD_SPAWN_FAILED: &str = "Failed to start sync thread.";
1190
1191pub const SYNC_UNKNOWN_PROVIDER: &str = "Unknown provider.";
1192
1193pub fn vault_signing_cancelled_summary(
1196 signed: u32,
1197 failed: u32,
1198 first_error: Option<&str>,
1199) -> String {
1200 let mut msg = format!(
1201 "Vault SSH signing cancelled ({} signed, {} failed)",
1202 signed, failed
1203 );
1204 if let Some(err) = first_error {
1205 msg.push_str(": ");
1206 msg.push_str(err);
1207 }
1208 msg
1209}
1210
1211pub fn regions_selected_count(count: usize, label: &str) -> String {
1214 let s = if count == 1 { "" } else { "s" };
1215 format!("{} {}{} selected.", count, label, s)
1216}
1217
1218pub const NO_CLIPBOARD_TOOL: &str =
1223 "No clipboard tool found. Install pbcopy (macOS), wl-copy (Wayland), or xclip/xsel (X11).";
1224
1225pub const MCP_TOOL_DENIED_READ_ONLY: &str = "Tool denied. Server started with --read-only. Restart without --read-only to enable state-changing tools.";
1228
1229pub fn mcp_audit_init_failed(path: &impl std::fmt::Display, e: &impl std::fmt::Display) -> String {
1233 format!(
1234 "Failed to initialise MCP audit log at {}: {}. Continuing without audit logging.",
1235 path, e
1236 )
1237}
1238
1239pub fn mcp_audit_write_failed(e: &impl std::fmt::Display) -> String {
1241 format!("Failed to write MCP audit entry: {}", e)
1242}
1243
1244pub fn mcp_config_file_not_found(path: &impl std::fmt::Display) -> String {
1248 format!("SSH config file not found: {}", path)
1249}
1250
1251pub const MCP_AUDIT_HOME_DIR_UNAVAILABLE: &str = "Could not determine home directory; MCP audit log disabled. Set --audit-log <PATH> explicitly to enable auditing.";
1255
1256pub const PALETTE_PLACEHOLDER: &str = "Find anything";
1260pub const PALETTE_NO_RESULTS: &str = "No matches.";
1262pub const PALETTE_SNIPPET_NEEDS_HOST: &str =
1265 "Pick a host first, then run a snippet from the jump bar.";
1266pub fn jump_more_rows(n: usize) -> String {
1269 format!("+{n} more (scroll down)")
1270}
1271
1272#[path = "messages/cli.rs"]
1275pub mod cli;
1276pub mod footer;
1277
1278pub mod update {
1281 pub const WHATS_NEW_HINT: &str = "Press n inside purple to see what's new.";
1282 pub const DONE: &str = "done.";
1283 pub const CHECKSUM_OK: &str = "ok.";
1284 pub const SUDO_WARNING: &str =
1285 "Running via sudo. Consider fixing directory permissions instead.";
1286
1287 pub const STEP_CHECKING: &str = " Checking for updates... ";
1292 pub const STEP_VERIFYING_CHECKSUM: &str = " Verifying checksum... ";
1293 pub const STEP_INSTALLING: &str = " Installing... ";
1294
1295 pub fn already_on(current: &str) -> String {
1296 format!("already on v{} (latest).", current)
1297 }
1298
1299 pub fn available(latest: &str, current: &str) -> String {
1300 format!("v{} available (current: v{}).", latest, current)
1301 }
1302
1303 pub fn step_downloading(version: &str) -> String {
1307 format!(" Downloading v{}... ", version)
1308 }
1309
1310 pub fn sudo_warning_line(bold_bang: &str) -> String {
1314 format!(" {} {}", bold_bang, SUDO_WARNING)
1315 }
1316
1317 pub fn header(bold_name: &str) -> String {
1318 format!("\n {} updater\n", bold_name)
1319 }
1320
1321 pub fn binary_path(path: &std::path::Path) -> String {
1322 format!(" Binary: {}", path.display())
1323 }
1324
1325 pub fn installed_at(bold_version: &str, path: &std::path::Path) -> String {
1326 format!("\n {} installed at {}.", bold_version, path.display())
1327 }
1328
1329 pub fn whats_new_hint_indented() -> String {
1330 format!("\n {}", WHATS_NEW_HINT)
1331 }
1332}
1333
1334pub mod askpass {
1337 pub const BW_NOT_FOUND: &str = "Bitwarden CLI (bw) not found. SSH will prompt for password.";
1338 pub const BW_NOT_LOGGED_IN: &str = "Bitwarden vault not logged in. Run 'bw login' first.";
1339 pub const EMPTY_PASSWORD: &str = "Empty password. SSH will prompt for password.";
1340 pub const PASSWORD_IN_KEYCHAIN: &str = "Password stored in keychain.";
1341
1342 pub fn read_failed(e: &impl std::fmt::Display) -> String {
1343 format!("Failed to read password: {}", e)
1344 }
1345
1346 pub fn unlock_failed_retry(e: &impl std::fmt::Display) -> String {
1347 format!("Unlock failed: {}. Try again.", e)
1348 }
1349
1350 pub fn unlock_failed_prompt(e: &impl std::fmt::Display) -> String {
1351 format!("Unlock failed: {}. SSH will prompt for password.", e)
1352 }
1353
1354 pub fn password_prompt(alias: &str) -> String {
1358 format!("Password for {}: ", alias)
1359 }
1360
1361 pub fn keychain_password_prompt(alias: &str) -> String {
1364 format!("Password for {} (stored in keychain): ", alias)
1365 }
1366
1367 pub fn keychain_store_failed(e: &impl std::fmt::Display) -> String {
1370 format!(
1371 "Failed to store in keychain: {}. SSH will prompt for password.",
1372 e
1373 )
1374 }
1375}
1376
1377pub mod logging {
1380 pub fn init_failed(e: &impl std::fmt::Display) -> String {
1381 format!("[purple] Failed to initialize logger: {}", e)
1382 }
1383
1384 pub const SSH_VERSION_FAILED: &str = "[purple] Failed to detect SSH version. Is ssh installed?";
1385}
1386
1387pub mod hints {
1393 pub const IDENTITY_FILE_PICK: &str = "Space to pick a key";
1398 pub const DEFAULT_SSH_USER: &str = "root";
1399
1400 pub const HOST_ALIAS: &str = "e.g. prod or db-01";
1402 pub const HOST_ALIAS_PATTERN: &str = "10.0.0.* or *.example.com";
1403 pub const HOST_HOSTNAME: &str = "192.168.1.1 or example.com";
1404 pub const HOST_PORT: &str = "22";
1405 pub const HOST_PROXY_JUMP: &str = "Space to pick a host";
1406 pub const HOST_VAULT_SSH: &str = "e.g. ssh-client-signer/sign/my-role (auth via vault login)";
1407 pub const HOST_VAULT_SSH_PICKER: &str = "Space to pick a role or type one";
1408 pub const HOST_VAULT_ADDR: &str =
1409 "e.g. http://127.0.0.1:8200 (inherits from provider or env when empty)";
1410 pub const HOST_TAGS: &str = "e.g. prod, staging, us-east (comma-separated)";
1411 pub const HOST_ASKPASS_PICK: &str = "Space to pick a source";
1412
1413 pub fn askpass_default(default: &str) -> String {
1414 format!("default: {}", default)
1415 }
1416
1417 pub fn inherits_from(value: &str, provider: &str) -> String {
1418 format!("inherits {} from {}", value, provider)
1419 }
1420
1421 pub const TUNNEL_BIND_PORT: &str = "8080";
1423 pub const TUNNEL_REMOTE_HOST: &str = "localhost";
1424 pub const TUNNEL_REMOTE_PORT: &str = "80";
1425
1426 pub const SNIPPET_NAME: &str = "check-disk";
1428 pub const SNIPPET_COMMAND: &str = "df -h";
1429 pub const SNIPPET_OPTIONAL: &str = "(optional)";
1430
1431 pub const PROVIDER_URL: &str = "https://pve.example.com:8006";
1433 pub const PROVIDER_TOKEN_DEFAULT: &str = "your-api-token";
1434 pub const PROVIDER_TOKEN_PROXMOX: &str = "user@pam!token=secret";
1435 pub const PROVIDER_TOKEN_AWS: &str = "AccessKeyId:Secret (or use Profile)";
1436 pub const PROVIDER_TOKEN_GCP: &str = "/path/to/service-account.json (or access token)";
1437 pub const PROVIDER_TOKEN_AZURE: &str = "/path/to/service-principal.json (or access token)";
1438 pub const PROVIDER_TOKEN_TAILSCALE: &str = "API key (leave empty for local CLI)";
1439 pub const PROVIDER_TOKEN_ORACLE: &str = "~/.oci/config";
1440 pub const PROVIDER_TOKEN_OVH: &str = "app_key:app_secret:consumer_key";
1441 pub const PROVIDER_PROFILE: &str = "Name from ~/.aws/credentials (or use Token)";
1442 pub const PROVIDER_PROJECT_DEFAULT: &str = "my-gcp-project-id";
1443 pub const PROVIDER_PROJECT_OVH: &str = "Public Cloud project ID";
1444 pub const PROVIDER_COMPARTMENT: &str = "ocid1.compartment.oc1..aaaa...";
1445 pub const PROVIDER_REGIONS_DEFAULT: &str = "Space to select regions";
1446 pub const PROVIDER_REGIONS_GCP: &str = "Space to select zones (empty = all)";
1447 pub const PROVIDER_REGIONS_SCALEWAY: &str = "Space to select zones";
1448 pub const PROVIDER_REGIONS_AZURE: &str = "comma-separated subscription IDs";
1450 pub const PROVIDER_REGIONS_OVH: &str = "Space to select endpoint (default: EU)";
1451 pub const PROVIDER_USER_AWS: &str = "ec2-user";
1452 pub const PROVIDER_USER_GCP: &str = "ubuntu";
1453 pub const PROVIDER_USER_AZURE: &str = "azureuser";
1454 pub const PROVIDER_USER_ORACLE: &str = "opc";
1455 pub const PROVIDER_USER_OVH: &str = "ubuntu";
1456 pub const PROVIDER_VAULT_ROLE: &str =
1457 "e.g. ssh-client-signer/sign/my-role (vault login; inherited)";
1458 pub const PROVIDER_VAULT_ADDR: &str = "e.g. http://127.0.0.1:8200 (inherited by all hosts)";
1459 pub const PROVIDER_ALIAS_PREFIX_DEFAULT: &str = "prefix";
1460}
1461
1462#[cfg(test)]
1463mod hints_tests {
1464 use super::hints;
1465
1466 #[test]
1467 fn askpass_default_formats() {
1468 assert_eq!(hints::askpass_default("keychain"), "default: keychain");
1469 }
1470
1471 #[test]
1472 fn askpass_default_formats_empty() {
1473 assert_eq!(hints::askpass_default(""), "default: ");
1474 }
1475
1476 #[test]
1477 fn inherits_from_formats() {
1478 assert_eq!(
1479 hints::inherits_from("role/x", "aws"),
1480 "inherits role/x from aws"
1481 );
1482 }
1483
1484 #[test]
1485 fn picker_hints_mention_space_not_enter() {
1486 for s in [
1489 hints::IDENTITY_FILE_PICK,
1490 hints::HOST_PROXY_JUMP,
1491 hints::HOST_VAULT_SSH_PICKER,
1492 hints::HOST_ASKPASS_PICK,
1493 hints::PROVIDER_REGIONS_DEFAULT,
1494 hints::PROVIDER_REGIONS_GCP,
1495 hints::PROVIDER_REGIONS_SCALEWAY,
1496 hints::PROVIDER_REGIONS_OVH,
1497 ] {
1498 assert!(
1499 s.starts_with("Space "),
1500 "picker hint must mention Space: {s}"
1501 );
1502 assert!(!s.contains("Enter "), "picker hint must not say Enter: {s}");
1503 }
1504 }
1505}
1506
1507#[path = "messages/whats_new.rs"]
1508pub mod whats_new;
1509
1510#[path = "messages/whats_new_toast.rs"]
1511pub mod whats_new_toast;
1512
1513#[cfg(test)]
1514mod stale_host_tests {
1515 use super::stale_host;
1516
1517 #[test]
1518 fn empty_hint_returns_bare_sentence() {
1519 assert_eq!(stale_host(""), "Stale host.");
1520 }
1521
1522 #[test]
1523 fn empty_after_trim_returns_bare_sentence() {
1524 assert_eq!(stale_host(" "), "Stale host.");
1525 }
1526
1527 #[test]
1528 fn provider_hint_is_appended_with_space_and_period() {
1529 assert_eq!(
1530 stale_host("Gone from DigitalOcean"),
1531 "Stale host. Gone from DigitalOcean."
1532 );
1533 }
1534
1535 #[test]
1536 fn trailing_period_in_hint_is_not_doubled() {
1537 assert_eq!(
1538 stale_host("Gone from DigitalOcean."),
1539 "Stale host. Gone from DigitalOcean."
1540 );
1541 }
1542
1543 #[test]
1544 fn leading_space_in_hint_is_trimmed() {
1545 assert_eq!(stale_host(" Gone from AWS"), "Stale host. Gone from AWS.");
1546 }
1547}
1548
1549#[cfg(test)]
1550mod relative_age_tests {
1551 use super::relative_age;
1552 use std::time::Duration;
1553
1554 #[test]
1555 fn relative_age_boundaries() {
1556 assert_eq!(relative_age(Duration::from_secs(0)), "just now");
1557 assert_eq!(relative_age(Duration::from_secs(4)), "just now");
1558 assert_eq!(relative_age(Duration::from_secs(5)), "5s ago");
1559 assert_eq!(relative_age(Duration::from_secs(59)), "59s ago");
1560 assert_eq!(relative_age(Duration::from_secs(60)), "1m ago");
1561 assert_eq!(relative_age(Duration::from_secs(3599)), "59m ago");
1562 assert_eq!(relative_age(Duration::from_secs(3600)), "1h ago");
1563 assert_eq!(relative_age(Duration::from_secs(86399)), "23h ago");
1564 assert_eq!(relative_age(Duration::from_secs(86400)), "1d ago");
1565 assert_eq!(relative_age(Duration::from_secs(86400 * 7)), "7d ago");
1566 }
1567}