Skip to content

Commit 3da0693

Browse files
authored
address clippy warnings for azure_identity (#1403)
1 parent 1bbf919 commit 3da0693

File tree

10 files changed

+37
-39
lines changed

10 files changed

+37
-39
lines changed

sdk/identity/examples/client_certificate_credentials.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ async fn main() -> azure_core::Result<()> {
4343
tenant_id,
4444
client_id,
4545
base64::encode(cert),
46-
"".to_string(),
46+
String::new(),
4747
options,
4848
);
4949

sdk/identity/src/client_credentials_flow/login_response.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
use azure_core::auth::AccessToken;
2-
use serde::{de, Deserialize, Deserializer};
2+
use serde::{Deserialize, Deserializer};
33
use time::OffsetDateTime;
44

55
#[derive(Debug, Clone, Deserialize)]
6-
struct _LoginResponse {
6+
struct RawLogResponse {
77
token_type: String,
88
expires_in: u64,
99
ext_expires_in: u64,
@@ -29,8 +29,8 @@ impl<'de> Deserialize<'de> for LoginResponse {
2929
where
3030
D: Deserializer<'de>,
3131
{
32-
let resp = _LoginResponse::deserialize(deserializer)?;
33-
LoginResponse::from_base_response(resp).map_err(de::Error::custom)
32+
let resp = RawLogResponse::deserialize(deserializer)?;
33+
Ok(LoginResponse::from_base_response(resp))
3434
}
3535
}
3636

@@ -39,7 +39,7 @@ impl LoginResponse {
3939
&self.access_token
4040
}
4141

42-
fn from_base_response(r: _LoginResponse) -> Result<LoginResponse, std::num::ParseIntError> {
42+
fn from_base_response(r: RawLogResponse) -> LoginResponse {
4343
let expires_on: Option<OffsetDateTime> = r.expires_on.map(|d| {
4444
OffsetDateTime::from_unix_timestamp(d.parse::<i64>().unwrap_or(0))
4545
.unwrap_or(OffsetDateTime::UNIX_EPOCH)
@@ -49,14 +49,14 @@ impl LoginResponse {
4949
.unwrap_or(OffsetDateTime::UNIX_EPOCH)
5050
});
5151

52-
Ok(LoginResponse {
52+
LoginResponse {
5353
token_type: r.token_type,
5454
expires_in: r.expires_in,
5555
ext_expires_in: r.ext_expires_in,
5656
expires_on,
5757
not_before,
5858
resource: r.resource,
5959
access_token: AccessToken::new(r.access_token),
60-
})
60+
}
6161
}
6262
}

sdk/identity/src/development.rs

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,10 @@ pub fn naive_redirect_server(
2828
let mut request_line = String::new();
2929
reader.read_line(&mut request_line).unwrap();
3030

31-
let redirect_url = match request_line.split_whitespace().nth(1) {
32-
Some(redirect_url) => redirect_url,
33-
None => {
34-
return Err(Error::with_message(ErrorKind::Credential, || {
35-
format!("unexpected redirect url: {request_line}")
36-
}))
37-
}
31+
let Some(redirect_url) = request_line.split_whitespace().nth(1) else {
32+
return Err(Error::with_message(ErrorKind::Credential, || {
33+
format!("unexpected redirect url: {request_line}")
34+
}));
3835
};
3936
let url = Url::parse(&("http://localhost".to_string() + redirect_url)).unwrap();
4037

sdk/identity/src/federated_credentials_flow/login_response.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
use azure_core::auth::AccessToken;
2-
use serde::{de, Deserialize, Deserializer};
2+
use serde::{Deserialize, Deserializer};
33
use time::OffsetDateTime;
44

55
#[derive(Debug, Clone, Deserialize)]
6-
struct _LoginResponse {
6+
struct RawLoginResponse {
77
token_type: String,
88
expires_in: u64,
99
ext_expires_in: u64,
@@ -29,8 +29,8 @@ impl<'de> Deserialize<'de> for LoginResponse {
2929
where
3030
D: Deserializer<'de>,
3131
{
32-
let resp = _LoginResponse::deserialize(deserializer)?;
33-
LoginResponse::from_base_response(resp).map_err(de::Error::custom)
32+
let resp = RawLoginResponse::deserialize(deserializer)?;
33+
Ok(LoginResponse::from_base_response(resp))
3434
}
3535
}
3636

@@ -39,7 +39,7 @@ impl LoginResponse {
3939
&self.access_token
4040
}
4141

42-
fn from_base_response(r: _LoginResponse) -> Result<LoginResponse, std::num::ParseIntError> {
42+
fn from_base_response(r: RawLoginResponse) -> LoginResponse {
4343
let expires_on: Option<OffsetDateTime> = r.expires_on.map(|d| {
4444
OffsetDateTime::from_unix_timestamp(d.parse::<i64>().unwrap_or(0))
4545
.unwrap_or(OffsetDateTime::UNIX_EPOCH)
@@ -49,14 +49,14 @@ impl LoginResponse {
4949
.unwrap_or(OffsetDateTime::UNIX_EPOCH)
5050
});
5151

52-
Ok(LoginResponse {
52+
LoginResponse {
5353
token_type: r.token_type,
5454
expires_in: r.expires_in,
5555
ext_expires_in: r.ext_expires_in,
5656
expires_on,
5757
not_before,
5858
resource: r.resource,
5959
access_token: AccessToken::new(r.access_token),
60-
})
60+
}
6161
}
6262
}

sdk/identity/src/oauth2_http_client.rs

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -87,15 +87,14 @@ fn to_headers(map: &oauth2::http::header::HeaderMap) -> azure_core::headers::Hea
8787
.iter()
8888
.filter_map(|(k, v)| {
8989
let key = k.as_str();
90-
match std::str::from_utf8(v.as_bytes()) {
91-
Ok(value) => Some((
90+
if let Ok(value) = v.to_str() {
91+
Some((
9292
azure_core::headers::HeaderName::from(key.to_owned()),
9393
azure_core::headers::HeaderValue::from(value.to_owned()),
94-
)),
95-
Err(_) => {
96-
log::warn!("header value for `{key}` is not utf8");
97-
None
98-
}
94+
))
95+
} else {
96+
log::warn!("header value for `{key}` is not utf8");
97+
None
9998
}
10099
})
101100
.collect::<HashMap<_, _>>();

sdk/identity/src/refresh_token.rs

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,8 @@ pub async fn exchange(
5353
if !rsp_status.is_success() {
5454
if let Ok(token_error) = serde_json::from_slice::<RefreshTokenError>(&rsp_body) {
5555
return Err(Error::new(ErrorKind::Credential, token_error));
56-
} else {
57-
return Err(ErrorKind::http_response_from_body(rsp_status, &rsp_body).into_error());
5856
}
57+
return Err(ErrorKind::http_response_from_body(rsp_status, &rsp_body).into_error());
5958
}
6059

6160
serde_json::from_slice::<RefreshTokenResponse>(&rsp_body).map_kind(ErrorKind::Credential)
@@ -107,7 +106,7 @@ mod deserialize {
107106
D: Deserializer<'de>,
108107
{
109108
let string: String = serde::Deserialize::deserialize(scope)?;
110-
Ok(string.split(' ').map(|s| s.to_owned()).collect())
109+
Ok(string.split(' ').map(ToOwned::to_owned).collect())
111110
}
112111
}
113112

sdk/identity/src/token_credentials/default_credentials.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ impl DefaultAzureCredentialBuilder {
5252

5353
/// Create a `DefaultAzureCredential` from this builder.
5454
pub fn build(&self) -> DefaultAzureCredential {
55-
let source_count = self.include_azure_cli_credential as usize
56-
+ self.include_azure_cli_credential as usize
57-
+ self.include_managed_identity_credential as usize;
55+
let source_count = usize::from(self.include_azure_cli_credential)
56+
+ usize::from(self.include_azure_cli_credential)
57+
+ usize::from(self.include_managed_identity_credential);
5858
let mut sources = Vec::<DefaultAzureCredentialEnum>::with_capacity(source_count);
5959
if self.include_environment_credential {
6060
sources.push(DefaultAzureCredentialEnum::Environment(
@@ -173,7 +173,7 @@ impl TokenCredential for DefaultAzureCredential {
173173
fn format_aggregate_error(errors: &[Error]) -> String {
174174
errors
175175
.iter()
176-
.map(|error| error.to_string())
176+
.map(ToString::to_string)
177177
.collect::<Vec<String>>()
178178
.join("\n")
179179
}

sdk/identity/src/token_credentials/environment_credentials.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ const AZURE_FEDERATED_TOKEN_FILE: &str = "AZURE_FEDERATED_TOKEN_FILE";
1414
const AZURE_FEDERATED_TOKEN: &str = "AZURE_FEDERATED_TOKEN";
1515
const AZURE_AUTHORITY_HOST: &str = "AZURE_AUTHORITY_HOST";
1616

17-
/// Enables authentication with Workflows Identity if either AZURE_FEDERATED_TOKEN or AZURE_FEDERATED_TOKEN_FILE is set,
17+
/// Enables authentication with Workflows Identity if either `AZURE_FEDERATED_TOKEN` or `AZURE_FEDERATED_TOKEN_FILE` is set,
1818
/// otherwise enables authentication to Azure Active Directory using client secret, or a username and password.
1919
///
2020
///
@@ -26,7 +26,7 @@ const AZURE_AUTHORITY_HOST: &str = "AZURE_AUTHORITY_HOST";
2626
/// | `AZURE_CLIENT_ID` | The client(application) ID of an App Registration in the tenant. |
2727
/// | `AZURE_CLIENT_SECRET` | A client secret that was generated for the App Registration. |
2828
/// | `AZURE_FEDERATED_TOKEN_FILE` | Path to an federated token file. Variable is present in pods with aks workload identities. |
29-
/// | `AZURE_AUTHORITY_HOST` | Url for the identity provider to exchange to federated token for an access_token. Variable is present in pods with aks workload identities. |
29+
/// | `AZURE_AUTHORITY_HOST` | Url for the identity provider to exchange to federated token for an `access_token`. Variable is present in pods with aks workload identities. |
3030
///
3131
/// This credential ultimately uses a or `WorkloadIdentityCredential` a`ClientSecretCredential` to perform the authentication using
3232
/// these details.

sdk/identity/src/token_credentials/imds_managed_identity_credentials.rs

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ impl ImdsManagedIdentityCredential {
4949
/// Specifies the object id associated with a user assigned managed service identity resource that should be used to retrieve the access token.
5050
///
5151
/// The values of `client_id` and `msi_res_id` are discarded, as only one id parameter may be set when getting a token.
52+
#[must_use]
5253
pub fn with_object_id<A>(mut self, object_id: A) -> Self
5354
where
5455
A: Into<String>,
@@ -62,6 +63,7 @@ impl ImdsManagedIdentityCredential {
6263
/// Specifies the application id (client id) associated with a user assigned managed service identity resource that should be used to retrieve the access token.
6364
///
6465
/// The values of `object_id` and `msi_res_id` are discarded, as only one id parameter may be set when getting a token.
66+
#[must_use]
6567
pub fn with_client_id<A>(mut self, client_id: A) -> Self
6668
where
6769
A: Into<String>,
@@ -75,6 +77,7 @@ impl ImdsManagedIdentityCredential {
7577
/// Specifies the ARM resource id of the user assigned managed service identity resource that should be used to retrieve the access token.
7678
///
7779
/// The values of `object_id` and `client_id` are discarded, as only one id parameter may be set when getting a token.
80+
#[must_use]
7881
pub fn with_identity<A>(mut self, msi_res_id: A) -> Self
7982
where
8083
A: Into<String>,

sdk/identity/src/token_credentials/workload_identity_credentials.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ impl WorkloadIdentityCredential {
3737
}
3838
}
3939

40-
/// set TokenCredentialOptions
40+
/// set `TokenCredentialOptions`
4141
pub fn set_options(&mut self, options: TokenCredentialOptions) {
4242
self.options = options;
4343
}

0 commit comments

Comments
 (0)