aboutsummaryrefslogtreecommitdiff
path: root/src/modules/auth
diff options
context:
space:
mode:
authormetamuffin <metamuffin@disroot.org>2025-03-19 19:35:16 +0100
committermetamuffin <metamuffin@disroot.org>2025-03-19 19:35:16 +0100
commit69a77b36172503ada9047a756bb5972a4c7005dc (patch)
tree8a361183533e972d38b06b59f7a77c98f76b3ab3 /src/modules/auth
parente22020da294381b22998ee885876b56614bca890 (diff)
downloadgnix-69a77b36172503ada9047a756bb5972a4c7005dc.tar
gnix-69a77b36172503ada9047a756bb5972a4c7005dc.tar.bz2
gnix-69a77b36172503ada9047a756bb5972a4c7005dc.tar.zst
clippy
Diffstat (limited to 'src/modules/auth')
-rw-r--r--src/modules/auth/cookie.rs6
-rw-r--r--src/modules/auth/openid.rs8
2 files changed, 7 insertions, 7 deletions
diff --git a/src/modules/auth/cookie.rs b/src/modules/auth/cookie.rs
index e078b6f..8e6d1d6 100644
--- a/src/modules/auth/cookie.rs
+++ b/src/modules/auth/cookie.rs
@@ -77,7 +77,7 @@ impl Node for CookieAuth {
debug!("login attempt for {username:?}");
if self.users.authentificate(username, password) {
debug!("login success via creds");
- Ok(login_success_response(context, &self, referrer, username))
+ Ok(login_success_response(context, self, referrer, username))
} else {
debug!("login fail");
let mut r = Response::new(BoxBody::<_, ServiceError>::new(
@@ -133,12 +133,12 @@ impl Node for CookieAuth {
if let Some(username) = r.headers_mut().remove("gnix-auth-success") {
debug!("login success via fail handler");
if r.headers_mut().remove("gnix-auth-no-redirect").is_some() {
- apply_login_success_headers(context, &self, username.to_str()?, &mut r);
+ apply_login_success_headers(context, self, username.to_str()?, &mut r);
Ok(r)
} else {
Ok(login_success_response(
context,
- &self,
+ self,
referrer,
username.to_str()?,
))
diff --git a/src/modules/auth/openid.rs b/src/modules/auth/openid.rs
index db03c2f..e22bc24 100644
--- a/src/modules/auth/openid.rs
+++ b/src/modules/auth/openid.rs
@@ -143,7 +143,7 @@ id_token={id_token:?}"#
let mut v = context
.state
.crypto_key
- .encrypt(Nonce::from_slice(&nonce), Payload { msg: &r, aad: &[] })
+ .encrypt(Nonce::from_slice(&nonce), Payload { msg: r, aad: &[] })
.unwrap();
v.extend(nonce);
@@ -190,7 +190,7 @@ fn redirect_uri(request: &NodeRequest) -> Result<Uri, ServiceError> {
.to_str()?,
)
.ok();
- Ok(Uri::from_parts(redirect_uri).map_err(|_| ServiceError::InvalidUri)?)
+ Uri::from_parts(redirect_uri).map_err(|_| ServiceError::InvalidUri)
}
async fn token_request(
@@ -234,8 +234,8 @@ async fn token_request(
let mut buf = String::new();
body.reader().read_to_string(&mut buf).unwrap();
eprintln!("{buf}");
- Ok(serde_json::from_str(&buf)
- .map_err(|_| ServiceError::CustomStatic("invalid token response"))?)
+ serde_json::from_str(&buf)
+ .map_err(|_| ServiceError::CustomStatic("invalid token response"))
}
#[derive(Debug, Deserialize)]