From db3dbc6aaa29f9d34514bac14dbcbd9918901205 Mon Sep 17 00:00:00 2001 From: Rutger Broekhoff Date: Sat, 30 Mar 2024 15:21:30 +0100 Subject: cargo fmt --- server/src/main.rs | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) (limited to 'server') diff --git a/server/src/main.rs b/server/src/main.rs index e615d19..514be39 100644 --- a/server/src/main.rs +++ b/server/src/main.rs @@ -789,16 +789,16 @@ fn authorize_batch_unauthenticated( StatusCode::FORBIDDEN, "Authentication required to upload", )); - }, + } common::Operation::Download => { // Again, trusted users can see all repos. For untrusted users, we first need to check // whether the repo is public before we authorize. If the user is untrusted and the // repo isn't public, we just act like it doesn't even exist. if !trusted { if !public { - return Err(REPO_NOT_FOUND) + return Err(REPO_NOT_FOUND); } - return Ok(Trusted(false)) + return Ok(Trusted(false)); } return Ok(Trusted(true)); } @@ -931,12 +931,13 @@ fn verify_claims( return Ok(false); }; let authz = authz.to_str().map_err(|_| INVALID_AUTHZ_HEADER)?; - let val = authz.strip_prefix("Gitolfs3-Hmac-Sha256 ").ok_or(INVALID_AUTHZ_HEADER)?; + let val = authz + .strip_prefix("Gitolfs3-Hmac-Sha256 ") + .ok_or(INVALID_AUTHZ_HEADER)?; let (tag, expires_at) = val.split_once(' ').ok_or(INVALID_AUTHZ_HEADER)?; let tag: common::Digest<32> = tag.parse().map_err(|_| INVALID_AUTHZ_HEADER)?; let expires_at: i64 = expires_at.parse().map_err(|_| INVALID_AUTHZ_HEADER)?; - let expires_at = - DateTime::::from_timestamp(expires_at, 0).ok_or(INVALID_AUTHZ_HEADER)?; + let expires_at = DateTime::::from_timestamp(expires_at, 0).ok_or(INVALID_AUTHZ_HEADER)?; let expected_tag = common::generate_tag( common::Claims { specific_claims: claims.specific_claims, @@ -944,10 +945,8 @@ fn verify_claims( expires_at, }, &conf.key, - ).ok_or_else(|| make_error_resp( - StatusCode::INTERNAL_SERVER_ERROR, - "Internal server error", - ))?; + ) + .ok_or_else(|| make_error_resp(StatusCode::INTERNAL_SERVER_ERROR, "Internal server error"))?; if tag != expected_tag { return Err(INVALID_AUTHZ_HEADER); } -- cgit v1.2.3