chore: upgrade to Rust 1.65 (#1441)

This commit is contained in:
Ethan Donowitz 2022-11-18 17:25:39 -05:00 committed by GitHub
parent 190d2a4561
commit b95e549acb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 11 additions and 11 deletions

View File

@ -160,7 +160,7 @@ commands:
jobs:
checks:
docker:
- image: cimg/rust:1.64.0
- image: cimg/rust:1.65.0
auth:
username: $DOCKER_USER
password: $DOCKER_PASS
@ -176,7 +176,7 @@ jobs:
build-and-test:
docker:
- image: cimg/rust:1.64.0
- image: cimg/rust:1.65.0
auth:
username: $DOCKER_USER
password: $DOCKER_PASS

View File

@ -1,4 +1,4 @@
FROM rust:1.64-buster as builder
FROM rust:1.65-buster as builder
WORKDIR /app
ADD . /app
ENV PATH=$PATH:/root/.cargo/bin

View File

@ -75,7 +75,7 @@ pub fn postbso(
) -> params::PostCollectionBso {
params::PostCollectionBso {
id: bid.to_owned(),
payload: payload.map(&str::to_owned),
payload: payload.map(str::to_owned),
sortindex,
ttl,
}

View File

@ -172,7 +172,7 @@ fn create_hawk_header(method: &str, port: u16, path: &str) -> String {
&SECRETS.master_secret,
)
.expect("hkdf_expand_32 failed in create_hawk_header");
let token_secret = base64::encode_config(&token_secret, base64::URL_SAFE);
let token_secret = base64::encode_config(token_secret, base64::URL_SAFE);
let request = RequestBuilder::new(method, host, port, path).request();
let credentials = Credentials {
id,

View File

@ -120,7 +120,7 @@ impl From<&RequestHead> for LogItems {
items.insert_if_not_empty("ua.os.family", metrics_os);
items.insert_if_not_empty("ua.browser.family", metrics_browser);
items.insert_if_not_empty("ua.name", ua_result.name);
items.insert_if_not_empty("ua.os.ver", &ua_result.os_version.to_owned());
items.insert_if_not_empty("ua.os.ver", &ua_result.os_version);
items.insert_if_not_empty("ua.browser.ver", ua_result.version);
items.insert_if_not_empty("ua", ua_result.version);
}

View File

@ -90,7 +90,7 @@ impl HawkPayload {
&secrets.master_secret,
)
.map_err(|e| ApiErrorKind::Internal(format!("HKDF Error: {:?}", e)))?;
let token_secret = base64::encode_config(&token_secret, base64::URL_SAFE);
let token_secret = base64::encode_config(token_secret, base64::URL_SAFE);
let request = RequestBuilder::new(method, host, port, path).request();

View File

@ -1830,7 +1830,7 @@ mod tests {
&SECRETS.master_secret,
)
.unwrap();
let token_secret = base64::encode_config(&token_secret, base64::URL_SAFE);
let token_secret = base64::encode_config(token_secret, base64::URL_SAFE);
let credentials = Credentials {
id,
key: Key::new(token_secret.as_bytes(), hawk::DigestAlgorithm::Sha256).unwrap(),

View File

@ -19,7 +19,7 @@ pub struct TokenserverError {
/// For internal use only. Used to report any additional context behind an error to
/// distinguish between similar errors in Sentry.
pub context: String,
pub backtrace: Backtrace,
pub backtrace: Box<Backtrace>,
pub token_type: TokenType,
}
@ -59,7 +59,7 @@ impl Default for TokenserverError {
description: "Unauthorized".to_owned(),
http_status: StatusCode::UNAUTHORIZED,
context: "Unauthorized".to_owned(),
backtrace: Backtrace::new(),
backtrace: Box::new(Backtrace::new()),
token_type: TokenType::Oauth,
}
}
@ -254,7 +254,7 @@ impl From<DbError> for TokenserverError {
TokenserverError {
description: db_error.to_string(),
context: db_error.to_string(),
backtrace: db_error.backtrace,
backtrace: Box::new(db_error.backtrace),
http_status: if db_error.status.is_server_error() {
// Use the status code from the DbError if it already suggests an internal error;
// it might be more specific than `StatusCode::SERVICE_UNAVAILABLE`