}
if self.repositories.is_empty() {
- return std::fs::remove_file(&path)
+ return std::fs::remove_file(path)
.map_err(|err| self.err(format_err!("unable to remove file - {}", err)));
}
if *b <= 0x20 || *b >= 0x7F || encode_chars.contains(*b as char) {
let mut hex = [0u8; 2];
// unwrap: we're hex-encoding a single byte into a 2-byte slice
- hex::encode_to_slice(&[*b], &mut hex).unwrap();
+ hex::encode_to_slice([*b], &mut hex).unwrap();
let hex = unsafe { std::str::from_utf8_unchecked(&hex) };
encoded = format!("{}%{}", encoded, hex);
} else {
bail!("too many pending openid auth request for realm {}", realm);
}
- data.push(serde_json::to_value(&auth_state)?);
+ data.push(serde_json::to_value(auth_state)?);
replace_auth_state(&path, &data)?;
fn log(&self, level: log::Level, message: &std::fmt::Arguments) {
match level {
- log::Level::Error => self.log_warning(&message.to_string()),
- log::Level::Warn => self.log_warning(&message.to_string()),
- log::Level::Info => self.log_message(&message.to_string()),
- log::Level::Debug => self.log_message(&format!("DEBUG: {}", message)),
- log::Level::Trace => self.log_message(&format!("TRACE: {}", message)),
+ log::Level::Error => self.log_warning(message.to_string()),
+ log::Level::Warn => self.log_warning(message.to_string()),
+ log::Level::Info => self.log_message(message.to_string()),
+ log::Level::Debug => self.log_message(format!("DEBUG: {}", message)),
+ log::Level::Trace => self.log_message(format!("TRACE: {}", message)),
}
}
}
}
fn serialize_str(mut self, v: &str) -> Result<Self::Ok, Error> {
- if v.contains(&['"', '\\', '\n']) {
+ if v.contains(['"', '\\', '\n']) {
self.inner.write_char('"')?;
crate::property_string::quote(v, &mut self.inner)?;
self.inner.write_char('"')?;
fn finish(mut self) -> Result<T, Error> {
let value = self.inner.finish()?;
- if value.contains(&[',', ';', ' ', '"', '\\', '\n']) {
+ if value.contains([',', ';', ' ', '"', '\\', '\n']) {
self.output.write_char('"')?;
crate::property_string::quote(&value, &mut self.output)?;
self.output.write_char('"')?;
D: Deserializer<'de>,
{
use serde::de::Error;
- String::deserialize(deserializer).and_then(|string| {
- base64::decode(&string).map_err(|err| Error::custom(err.to_string()))
- })
+ String::deserialize(deserializer)
+ .and_then(|string| base64::decode(string).map_err(|err| Error::custom(err.to_string())))
}
}
fn finish_deserializing<'de, D: Deserializer<'de>>(string: String) -> Result<String, D::Error> {
use serde::de::Error;
- let bytes = base64::decode(&string).map_err(|err| {
+ let bytes = base64::decode(string).map_err(|err| {
let msg = format!("base64 decode: {}", err);
Error::custom(msg)
})?;
{
use serde::de::Error;
String::deserialize(deserializer).and_then(|string| {
- base64::decode_config(&string, base64::URL_SAFE_NO_PAD)
+ base64::decode_config(string, base64::URL_SAFE_NO_PAD)
.map_err(|err| Error::custom(err.to_string()))
})
}
client: C,
) -> Result<(String, String), Error> {
// WHCMS sample code feeds the key into this, but it's just a challenge, so keep it simple
- let rand = hex::encode(&proxmox_sys::linux::random_data(16)?);
+ let rand = hex::encode(proxmox_sys::linux::random_data(16)?);
let challenge = format!("{}{}", checktime, rand);
let params = json!({