mirror of
https://github.com/lldap/lldap.git
synced 2026-03-31 15:07:48 +01:00
meta: Fix cargo clippy failures (format strings)
This commit is contained in:
committed by
nitnelave
parent
53e62ecf5a
commit
87e9311a44
@@ -12,11 +12,11 @@ pub fn deserialize_attribute_value(
|
||||
let parse_int = |value: &String| -> Result<i64> {
|
||||
value
|
||||
.parse::<i64>()
|
||||
.with_context(|| format!("Invalid integer value {}", value))
|
||||
.with_context(|| format!("Invalid integer value {value}"))
|
||||
};
|
||||
let parse_date = |value: &String| -> Result<chrono::NaiveDateTime> {
|
||||
Ok(chrono::DateTime::parse_from_rfc3339(value)
|
||||
.with_context(|| format!("Invalid date value {}", value))?
|
||||
.with_context(|| format!("Invalid date value {value}"))?
|
||||
.naive_utc())
|
||||
};
|
||||
let parse_photo = |value: &String| -> Result<JpegPhoto> {
|
||||
|
||||
@@ -377,7 +377,7 @@ impl std::fmt::Debug for JpegPhoto {
|
||||
encoded.push_str(" ...");
|
||||
};
|
||||
f.debug_tuple("JpegPhoto")
|
||||
.field(&format!("b64[{}]", encoded))
|
||||
.field(&format!("b64[{encoded}]"))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
@@ -75,7 +75,7 @@ pub fn export_schema(output_file: Option<String>) -> anyhow::Result<()> {
|
||||
use lldap_sql_backend_handler::SqlBackendHandler;
|
||||
let output = schema::<SqlBackendHandler>().as_schema_language();
|
||||
match output_file {
|
||||
None => println!("{}", output),
|
||||
None => println!("{output}"),
|
||||
Some(path) => {
|
||||
use std::fs::File;
|
||||
use std::io::prelude::*;
|
||||
|
||||
@@ -76,7 +76,7 @@ pub fn get_group_attribute(
|
||||
.users
|
||||
.iter()
|
||||
.filter(|u| user_filter.as_ref().map(|f| *u == f).unwrap_or(true))
|
||||
.map(|u| format!("uid={},ou=people,{}", u, base_dn_str).into_bytes())
|
||||
.map(|u| format!("uid={u},ou=people,{base_dn_str}").into_bytes())
|
||||
.collect(),
|
||||
GroupFieldType::Uuid => vec![group.uuid.to_string().into_bytes()],
|
||||
GroupFieldType::Attribute(attr, _, _) => get_custom_attribute(&group.attributes, &attr)?,
|
||||
@@ -86,8 +86,7 @@ pub fn get_group_attribute(
|
||||
"+" => return None,
|
||||
"*" => {
|
||||
panic!(
|
||||
"Matched {}, * should have been expanded into attribute list and * removed",
|
||||
attribute
|
||||
"Matched {attribute}, * should have been expanded into attribute list and * removed"
|
||||
)
|
||||
}
|
||||
_ => {
|
||||
@@ -211,7 +210,7 @@ fn convert_group_filter(
|
||||
.map(GroupRequestFilter::Uuid)
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::Other,
|
||||
message: format!("Invalid UUID: {:#}", e),
|
||||
message: format!("Invalid UUID: {e:#}"),
|
||||
}),
|
||||
GroupFieldType::Member => Ok(get_user_id_from_distinguished_name_or_plain_name(
|
||||
&value_lc,
|
||||
@@ -290,15 +289,14 @@ fn convert_group_filter(
|
||||
_ => Err(LdapError {
|
||||
code: LdapResultCode::UnwillingToPerform,
|
||||
message: format!(
|
||||
"Unsupported group attribute for substring filter: \"{}\"",
|
||||
field
|
||||
"Unsupported group attribute for substring filter: \"{field}\""
|
||||
),
|
||||
}),
|
||||
}
|
||||
}
|
||||
_ => Err(LdapError {
|
||||
code: LdapResultCode::UnwillingToPerform,
|
||||
message: format!("Unsupported group filter: {:?}", filter),
|
||||
message: format!("Unsupported group filter: {filter:?}"),
|
||||
}),
|
||||
}
|
||||
}
|
||||
@@ -318,7 +316,7 @@ pub async fn get_groups_list<Backend: GroupListerBackendHandler>(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::Other,
|
||||
message: format!(r#"Error while listing groups "{}": {:#}"#, base, e),
|
||||
message: format!(r#"Error while listing groups "{base}": {e:#}"#),
|
||||
})
|
||||
}
|
||||
|
||||
|
||||
@@ -100,8 +100,7 @@ pub fn get_user_attribute(
|
||||
"+" => return None,
|
||||
"*" => {
|
||||
panic!(
|
||||
"Matched {}, * should have been expanded into attribute list and * removed",
|
||||
attribute
|
||||
"Matched {attribute}, * should have been expanded into attribute list and * removed"
|
||||
)
|
||||
}
|
||||
_ => {
|
||||
@@ -298,10 +297,7 @@ fn convert_user_filter(
|
||||
| UserFieldType::PrimaryField(UserColumn::CreationDate)
|
||||
| UserFieldType::PrimaryField(UserColumn::Uuid) => Err(LdapError {
|
||||
code: LdapResultCode::UnwillingToPerform,
|
||||
message: format!(
|
||||
"Unsupported user attribute for substring filter: {:?}",
|
||||
field
|
||||
),
|
||||
message: format!("Unsupported user attribute for substring filter: {field:?}"),
|
||||
}),
|
||||
UserFieldType::NoMatch => Ok(UserRequestFilter::from(false)),
|
||||
UserFieldType::PrimaryField(UserColumn::Email) => Ok(UserRequestFilter::SubString(
|
||||
@@ -316,7 +312,7 @@ fn convert_user_filter(
|
||||
}
|
||||
_ => Err(LdapError {
|
||||
code: LdapResultCode::UnwillingToPerform,
|
||||
message: format!("Unsupported user filter: {:?}", filter),
|
||||
message: format!("Unsupported user filter: {filter:?}"),
|
||||
}),
|
||||
}
|
||||
}
|
||||
@@ -341,7 +337,7 @@ pub async fn get_user_list<Backend: UserListerBackendHandler>(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::Other,
|
||||
message: format!(r#"Error while searching user "{}": {:#}"#, base, e),
|
||||
message: format!(r#"Error while searching user "{base}": {e:#}"#),
|
||||
})
|
||||
}
|
||||
|
||||
|
||||
@@ -66,10 +66,9 @@ impl UserOrGroupName {
|
||||
UserOrGroupName::InvalidSyntax(err) => return err,
|
||||
UserOrGroupName::UnexpectedFormat
|
||||
| UserOrGroupName::User(_)
|
||||
| UserOrGroupName::Group(_) => format!(
|
||||
r#"Unexpected DN format. Got "{}", expected: {}"#,
|
||||
input, expected_format
|
||||
),
|
||||
| UserOrGroupName::Group(_) => {
|
||||
format!(r#"Unexpected DN format. Got "{input}", expected: {expected_format}"#)
|
||||
}
|
||||
},
|
||||
}
|
||||
}
|
||||
@@ -105,7 +104,7 @@ pub fn get_user_id_from_distinguished_name(
|
||||
) -> LdapResult<UserId> {
|
||||
match get_user_or_group_id_from_distinguished_name(dn, base_tree) {
|
||||
UserOrGroupName::User(user_id) => Ok(user_id),
|
||||
err => Err(err.into_ldap_error(dn, format!(r#""uid=id,ou=people,{}""#, base_dn_str))),
|
||||
err => Err(err.into_ldap_error(dn, format!(r#""uid=id,ou=people,{base_dn_str}""#))),
|
||||
}
|
||||
}
|
||||
|
||||
@@ -116,7 +115,7 @@ pub fn get_group_id_from_distinguished_name(
|
||||
) -> LdapResult<GroupName> {
|
||||
match get_user_or_group_id_from_distinguished_name(dn, base_tree) {
|
||||
UserOrGroupName::Group(group_name) => Ok(group_name),
|
||||
err => Err(err.into_ldap_error(dn, format!(r#""uid=id,ou=groups,{}""#, base_dn_str))),
|
||||
err => Err(err.into_ldap_error(dn, format!(r#""uid=id,ou=groups,{base_dn_str}""#))),
|
||||
}
|
||||
}
|
||||
|
||||
@@ -343,7 +342,7 @@ pub struct ObjectClassList(Vec<LdapObjectClass>);
|
||||
// See RFC4512 section 4.2.1 "objectClasses"
|
||||
impl ObjectClassList {
|
||||
pub fn format_for_ldap_schema_description(&self) -> String {
|
||||
join(self.0.iter().map(|c| format!("'{}'", c)), " ")
|
||||
join(self.0.iter().map(|c| format!("'{c}'")), " ")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -33,10 +33,7 @@ pub(crate) async fn create_user_or_group(
|
||||
}
|
||||
err => Err(err.into_ldap_error(
|
||||
&request.dn,
|
||||
format!(
|
||||
r#""uid=id,ou=people,{}" or "uid=id,ou=groups,{}""#,
|
||||
base_dn_str, base_dn_str
|
||||
),
|
||||
format!(r#""uid=id,ou=people,{base_dn_str}" or "uid=id,ou=groups,{base_dn_str}""#),
|
||||
)),
|
||||
}
|
||||
}
|
||||
@@ -73,10 +70,7 @@ async fn create_user(
|
||||
std::str::from_utf8(val)
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::ConstraintViolation,
|
||||
message: format!(
|
||||
"Attribute value is invalid UTF-8: {:#?} (value {:?})",
|
||||
e, val
|
||||
),
|
||||
message: format!("Attribute value is invalid UTF-8: {e:#?} (value {val:?})"),
|
||||
})
|
||||
.map(str::to_owned)
|
||||
}
|
||||
@@ -92,7 +86,7 @@ async fn create_user(
|
||||
value: deserialize::deserialize_attribute_value(&[value], typ, false).map_err(|e| {
|
||||
LdapError {
|
||||
code: LdapResultCode::ConstraintViolation,
|
||||
message: format!("Invalid attribute value: {}", e),
|
||||
message: format!("Invalid attribute value: {e}"),
|
||||
}
|
||||
})?,
|
||||
})
|
||||
@@ -134,7 +128,7 @@ async fn create_user(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Could not create user: {:#?}", e),
|
||||
message: format!("Could not create user: {e:#?}"),
|
||||
})?;
|
||||
Ok(vec![make_add_response(
|
||||
LdapResultCode::Success,
|
||||
@@ -156,7 +150,7 @@ async fn create_group(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Could not create group: {:#?}", e),
|
||||
message: format!("Could not create group: {e:#?}"),
|
||||
})?;
|
||||
Ok(vec![make_add_response(
|
||||
LdapResultCode::Success,
|
||||
|
||||
@@ -30,10 +30,7 @@ pub(crate) async fn delete_user_or_group(
|
||||
UserOrGroupName::Group(group_name) => delete_group(backend_handler, group_name).await,
|
||||
err => Err(err.into_ldap_error(
|
||||
&request,
|
||||
format!(
|
||||
r#""uid=id,ou=people,{}" or "uid=id,ou=groups,{}""#,
|
||||
base_dn_str, base_dn_str
|
||||
),
|
||||
format!(r#""uid=id,ou=people,{base_dn_str}" or "uid=id,ou=groups,{base_dn_str}""#),
|
||||
)),
|
||||
}
|
||||
}
|
||||
@@ -53,7 +50,7 @@ async fn delete_user(
|
||||
},
|
||||
e => LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Error while finding user: {:?}", e),
|
||||
message: format!("Error while finding user: {e:?}"),
|
||||
},
|
||||
})?;
|
||||
backend_handler
|
||||
@@ -61,7 +58,7 @@ async fn delete_user(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Error while deleting user: {:?}", e),
|
||||
message: format!("Error while deleting user: {e:?}"),
|
||||
})?;
|
||||
Ok(vec![make_del_response(
|
||||
LdapResultCode::Success,
|
||||
@@ -79,7 +76,7 @@ async fn delete_group(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Error while finding group: {:?}", e),
|
||||
message: format!("Error while finding group: {e:?}"),
|
||||
})?;
|
||||
let group_id = groups
|
||||
.iter()
|
||||
@@ -94,7 +91,7 @@ async fn delete_group(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Error while deleting group: {:?}", e),
|
||||
message: format!("Error while deleting group: {e:?}"),
|
||||
})?;
|
||||
Ok(vec![make_del_response(
|
||||
LdapResultCode::Success,
|
||||
|
||||
@@ -100,10 +100,7 @@ impl<Backend: BackendHandler + LoginHandler + OpaqueHandler> LdapHandler<Backend
|
||||
backend_handler,
|
||||
ldap_info: LdapInfo {
|
||||
base_dn: parse_distinguished_name(&ldap_base_dn).unwrap_or_else(|_| {
|
||||
panic!(
|
||||
"Invalid value for ldap_base_dn in configuration: {}",
|
||||
ldap_base_dn
|
||||
)
|
||||
panic!("Invalid value for ldap_base_dn in configuration: {ldap_base_dn}")
|
||||
}),
|
||||
base_dn_str: ldap_base_dn,
|
||||
ignored_user_attributes,
|
||||
@@ -155,7 +152,7 @@ impl<Backend: BackendHandler + LoginHandler + OpaqueHandler> LdapHandler<Backend
|
||||
|
||||
let schema = backend_handler.get_schema().await.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Unable to get schema: {:#}", e),
|
||||
message: format!("Unable to get schema: {e:#}"),
|
||||
})?;
|
||||
return Ok(vec![
|
||||
make_ldap_subschema_entry(PublicSchema::from(schema)),
|
||||
@@ -224,7 +221,7 @@ impl<Backend: BackendHandler + LoginHandler + OpaqueHandler> LdapHandler<Backend
|
||||
}
|
||||
Err(e) => vec![make_extended_response(
|
||||
LdapResultCode::ProtocolError,
|
||||
format!("Error while parsing password modify request: {:#?}", e),
|
||||
format!("Error while parsing password modify request: {e:#?}"),
|
||||
)],
|
||||
},
|
||||
OID_WHOAMI => {
|
||||
@@ -343,7 +340,7 @@ impl<Backend: BackendHandler + LoginHandler + OpaqueHandler> LdapHandler<Backend
|
||||
.unwrap_or_else(|e: LdapError| vec![make_search_error(e.code, e.message)]),
|
||||
op => vec![make_extended_response(
|
||||
LdapResultCode::UnwillingToPerform,
|
||||
format!("Unsupported operation: {:#?}", op),
|
||||
format!("Unsupported operation: {op:#?}"),
|
||||
)],
|
||||
})
|
||||
}
|
||||
|
||||
@@ -47,7 +47,7 @@ async fn handle_modify_change(
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::Other,
|
||||
message: format!("Error while changing the password: {:#?}", e),
|
||||
message: format!("Error while changing the password: {e:#?}"),
|
||||
})?;
|
||||
} else {
|
||||
return Err(LdapError {
|
||||
@@ -94,7 +94,7 @@ where
|
||||
.await
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Internal error while requesting user's groups: {:#?}", e),
|
||||
message: format!("Internal error while requesting user's groups: {e:#?}"),
|
||||
})?
|
||||
.iter()
|
||||
.any(|g| g.display_name == "lldap_admin".into());
|
||||
@@ -115,7 +115,7 @@ where
|
||||
}
|
||||
Err(e) => Err(LdapError {
|
||||
code: LdapResultCode::InvalidDNSyntax,
|
||||
message: format!("Invalid username: {}", e),
|
||||
message: format!("Invalid username: {e}"),
|
||||
}),
|
||||
}
|
||||
}
|
||||
@@ -166,7 +166,7 @@ mod tests {
|
||||
|
||||
fn make_password_modify_request(target_user: &str) -> LdapModifyRequest {
|
||||
LdapModifyRequest {
|
||||
dn: format!("uid={},ou=people,dc=example,dc=com", target_user),
|
||||
dn: format!("uid={target_user},ou=people,dc=example,dc=com"),
|
||||
changes: vec![LdapModify {
|
||||
operation: LdapModifyType::Replace,
|
||||
modification: ldap3_proto::LdapPartialAttribute {
|
||||
@@ -284,7 +284,7 @@ mod tests {
|
||||
let request = {
|
||||
let target_user = "bob";
|
||||
LdapModifyRequest {
|
||||
dn: format!("uid={},ou=people,dc=example,dc=com", target_user),
|
||||
dn: format!("uid={target_user},ou=people,dc=example,dc=com"),
|
||||
changes: vec![LdapModify {
|
||||
operation: LdapModifyType::Replace,
|
||||
modification: ldap3_proto::LdapPartialAttribute {
|
||||
|
||||
@@ -112,8 +112,7 @@ pub(crate) async fn do_password_modification<Handler: BackendHandler>(
|
||||
.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!(
|
||||
"Internal error while requesting user's groups: {:#?}",
|
||||
e
|
||||
"Internal error while requesting user's groups: {e:#?}"
|
||||
),
|
||||
})?
|
||||
.iter()
|
||||
@@ -131,7 +130,7 @@ pub(crate) async fn do_password_modification<Handler: BackendHandler>(
|
||||
{
|
||||
Err(LdapError {
|
||||
code: LdapResultCode::Other,
|
||||
message: format!("Error while changing the password: {:#?}", e),
|
||||
message: format!("Error while changing the password: {e:#?}"),
|
||||
})
|
||||
} else {
|
||||
Ok(vec![make_extended_response(
|
||||
@@ -142,7 +141,7 @@ pub(crate) async fn do_password_modification<Handler: BackendHandler>(
|
||||
}
|
||||
Err(e) => Err(LdapError {
|
||||
code: LdapResultCode::InvalidDNSyntax,
|
||||
message: format!("Invalid username: {}", e),
|
||||
message: format!("Invalid username: {e}"),
|
||||
}),
|
||||
}
|
||||
}
|
||||
|
||||
@@ -369,7 +369,7 @@ pub async fn do_search(
|
||||
) -> LdapResult<Vec<LdapOp>> {
|
||||
let schema = PublicSchema::from(backend_handler.get_schema().await.map_err(|e| LdapError {
|
||||
code: LdapResultCode::OperationsError,
|
||||
message: format!("Unable to get schema: {:#}", e),
|
||||
message: format!("Unable to get schema: {e:#}"),
|
||||
})?);
|
||||
let search_results = do_search_internal(ldap_info, backend_handler, request, &schema).await?;
|
||||
let mut results = match search_results {
|
||||
|
||||
@@ -91,7 +91,7 @@ pub mod tests {
|
||||
handler
|
||||
.create_user(CreateUserRequest {
|
||||
user_id: UserId::new(name),
|
||||
email: format!("{}@bob.bob", name).into(),
|
||||
email: format!("{name}@bob.bob").into(),
|
||||
display_name: Some("display ".to_string() + name),
|
||||
attributes: vec![
|
||||
DomainAttribute {
|
||||
|
||||
@@ -164,7 +164,7 @@ impl GroupBackendHandler for SqlBackendHandler {
|
||||
.one(&self.sql_pool)
|
||||
.await?
|
||||
.map(Into::<GroupDetails>::into)
|
||||
.ok_or_else(|| DomainError::EntityNotFound(format!("{:?}", group_id)))?;
|
||||
.ok_or_else(|| DomainError::EntityNotFound(format!("{group_id:?}")))?;
|
||||
let attributes = model::GroupAttributes::find()
|
||||
.filter(model::GroupAttributesColumn::GroupId.eq(group_details.group_id))
|
||||
.order_by_asc(model::GroupAttributesColumn::AttributeName)
|
||||
@@ -252,8 +252,7 @@ impl GroupBackendHandler for SqlBackendHandler {
|
||||
.await?;
|
||||
if res.rows_affected == 0 {
|
||||
return Err(DomainError::EntityNotFound(format!(
|
||||
"No such group: '{:?}'",
|
||||
group_id
|
||||
"No such group: '{group_id:?}'"
|
||||
)));
|
||||
}
|
||||
Ok(())
|
||||
@@ -306,8 +305,7 @@ impl SqlBackendHandler {
|
||||
remove_group_attributes.push(attribute);
|
||||
} else {
|
||||
return Err(DomainError::InternalError(format!(
|
||||
"Group attribute name {} doesn't exist in the schema, yet was attempted to be removed from the database",
|
||||
attribute
|
||||
"Group attribute name {attribute} doesn't exist in the schema, yet was attempted to be removed from the database"
|
||||
)));
|
||||
}
|
||||
}
|
||||
|
||||
@@ -240,8 +240,7 @@ impl SqlBackendHandler {
|
||||
remove_user_attributes.push(attribute);
|
||||
} else {
|
||||
return Err(DomainError::InternalError(format!(
|
||||
"User attribute name {} doesn't exist in the schema, yet was attempted to be removed from the database",
|
||||
attribute
|
||||
"User attribute name {attribute} doesn't exist in the schema, yet was attempted to be removed from the database"
|
||||
)));
|
||||
}
|
||||
}
|
||||
@@ -384,8 +383,7 @@ impl UserBackendHandler for SqlBackendHandler {
|
||||
.await?;
|
||||
if res.rows_affected == 0 {
|
||||
return Err(DomainError::EntityNotFound(format!(
|
||||
"No such user: '{}'",
|
||||
user_id
|
||||
"No such user: '{user_id}'"
|
||||
)));
|
||||
}
|
||||
Ok(())
|
||||
@@ -408,8 +406,7 @@ impl UserBackendHandler for SqlBackendHandler {
|
||||
.await?;
|
||||
if res.rows_affected == 0 {
|
||||
return Err(DomainError::EntityNotFound(format!(
|
||||
"No such membership: '{}' -> {:?}",
|
||||
user_id, group_id
|
||||
"No such membership: '{user_id}' -> {group_id:?}"
|
||||
)));
|
||||
}
|
||||
Ok(())
|
||||
|
||||
Reference in New Issue
Block a user