|
@@ -19,7 +19,7 @@ fn do_code_authorize<'l, 's>(
|
|
|
.map_err(|_| {
|
|
|
OIDCError(
|
|
|
OIDCErrorType::ServerError,
|
|
|
- format!("Failed to generate auth code."),
|
|
|
+ "failed to generate auth code".into(),
|
|
|
state,
|
|
|
)
|
|
|
})?
|
|
@@ -50,7 +50,7 @@ fn do_code_authorize<'l, 's>(
|
|
|
tide::http::Url::parse_with_params(redirect_uri.as_str(), new_params).map_err(|e| {
|
|
|
OIDCError(
|
|
|
OIDCErrorType::InvalidRequest,
|
|
|
- format!("could not parse redirect_uri as a URL: {e}"),
|
|
|
+ format!("could not parse redirect_uri as a URL: {e}").into(),
|
|
|
None,
|
|
|
)
|
|
|
})?,
|
|
@@ -63,7 +63,7 @@ pub(super) fn do_authorize(request: Request, state: Option<&str>) -> Result<tide
|
|
|
let realm = shelper.get_realm().map_err(|_| {
|
|
|
OIDCError(
|
|
|
OIDCErrorType::InvalidRequest,
|
|
|
- "No such realm!".to_string(),
|
|
|
+ "No such realm!".into(),
|
|
|
state,
|
|
|
)
|
|
|
})?;
|
|
@@ -79,7 +79,7 @@ pub(super) fn do_authorize(request: Request, state: Option<&str>) -> Result<tide
|
|
|
|
|
|
let qp: api::AuthorizationRequestQuery = request
|
|
|
.query()
|
|
|
- .map_err(|x| OIDCError(OIDCErrorType::InvalidRequest, x.to_string(), state))?;
|
|
|
+ .map_err(|x| OIDCError(OIDCErrorType::InvalidRequest, x.to_string().into(), state))?;
|
|
|
|
|
|
// collect session authentication info
|
|
|
|
|
@@ -100,7 +100,7 @@ pub(super) fn do_authorize(request: Request, state: Option<&str>) -> Result<tide
|
|
|
else {
|
|
|
return Err(OIDCError(
|
|
|
OIDCErrorType::ServerError,
|
|
|
- "Internal state error!".to_string(),
|
|
|
+ "Internal state error!".into(),
|
|
|
state,
|
|
|
));
|
|
|
};
|
|
@@ -117,7 +117,7 @@ pub(super) fn do_authorize(request: Request, state: Option<&str>) -> Result<tide
|
|
|
.ok_or_else(|| {
|
|
|
OIDCError(
|
|
|
OIDCErrorType::UnauthorizedClient,
|
|
|
- "Client does not exist".to_string(),
|
|
|
+ "Client does not exist".into(),
|
|
|
state,
|
|
|
)
|
|
|
})?;
|
|
@@ -144,7 +144,7 @@ pub(super) fn do_authorize(request: Request, state: Option<&str>) -> Result<tide
|
|
|
} else if qp.response_type == "token" {
|
|
|
let rhelper = request.state().core.realms.get_helper(realm.id()).unwrap();
|
|
|
|
|
|
- let token = rhelper.generate_access_token(&client, &user, scopes).map_err(|e| OIDCError(OIDCErrorType::ServerError, format!("could not generate token: {e}"), state))?;
|
|
|
+ let token = rhelper.generate_access_token(&client, &user, scopes).map_err(|e| OIDCError(OIDCErrorType::ServerError, format!("could not generate token: {e}").into(), state))?;
|
|
|
|
|
|
Ok(tide::Response::builder(200)
|
|
|
.content_type(tide::http::mime::JSON)
|
|
@@ -158,7 +158,7 @@ pub(super) fn do_authorize(request: Request, state: Option<&str>) -> Result<tide
|
|
|
} else {
|
|
|
Err(OIDCError(
|
|
|
OIDCErrorType::UnsupportedResponseType,
|
|
|
- "Only code and token are understood.".to_string(),
|
|
|
+ "Only code and token are understood.".into(),
|
|
|
state,
|
|
|
))
|
|
|
}
|