@@ -38,7 +38,7 @@ exit 23";
38
38
MsFlags :: empty ( ) ,
39
39
NONE ,
40
40
)
41
- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
41
+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
42
42
43
43
let test_path = tempdir. path ( ) . join ( "test" ) ;
44
44
@@ -67,31 +67,30 @@ exit 23";
67
67
. unwrap ( ) ;
68
68
process:: exit ( 0 ) ;
69
69
} else {
70
- panic ! ( "open failed: {}" , e ) ;
70
+ panic ! ( "open failed: {e}" ) ;
71
71
}
72
72
} )
73
73
. and_then ( |mut f| f. write ( SCRIPT_CONTENTS ) )
74
- . unwrap_or_else ( |e| panic ! ( "write failed: {}" , e ) ) ;
74
+ . unwrap_or_else ( |e| panic ! ( "write failed: {e}" ) ) ;
75
75
76
76
// Verify read.
77
77
let mut buf = Vec :: new ( ) ;
78
78
File :: open ( & test_path)
79
79
. and_then ( |mut f| f. read_to_end ( & mut buf) )
80
- . unwrap_or_else ( |e| panic ! ( "read failed: {}" , e ) ) ;
80
+ . unwrap_or_else ( |e| panic ! ( "read failed: {e}" ) ) ;
81
81
assert_eq ! ( buf, SCRIPT_CONTENTS ) ;
82
82
83
83
// Verify execute.
84
84
assert_eq ! (
85
85
EXPECTED_STATUS ,
86
86
Command :: new( & test_path)
87
87
. status( )
88
- . unwrap_or_else( |e| panic!( "exec failed: {}" , e ) )
88
+ . unwrap_or_else( |e| panic!( "exec failed: {e}" ) )
89
89
. code( )
90
90
. unwrap_or_else( || panic!( "child killed by signal" ) )
91
91
) ;
92
92
93
- umount ( tempdir. path ( ) )
94
- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e) ) ;
93
+ umount ( tempdir. path ( ) ) . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
95
94
}
96
95
97
96
pub fn test_mount_rdonly_disallows_write ( ) {
@@ -104,7 +103,7 @@ exit 23";
104
103
MsFlags :: MS_RDONLY ,
105
104
NONE ,
106
105
)
107
- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
106
+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
108
107
109
108
// EROFS: Read-only file system
110
109
assert_eq ! (
@@ -115,8 +114,7 @@ exit 23";
115
114
. unwrap( )
116
115
) ;
117
116
118
- umount ( tempdir. path ( ) )
119
- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e) ) ;
117
+ umount ( tempdir. path ( ) ) . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
120
118
}
121
119
122
120
pub fn test_mount_noexec_disallows_exec ( ) {
@@ -129,7 +127,7 @@ exit 23";
129
127
MsFlags :: MS_NOEXEC ,
130
128
NONE ,
131
129
)
132
- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
130
+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
133
131
134
132
let test_path = tempdir. path ( ) . join ( "test" ) ;
135
133
@@ -139,13 +137,13 @@ exit 23";
139
137
. mode ( ( Mode :: S_IRWXU | Mode :: S_IRWXG | Mode :: S_IRWXO ) . bits ( ) )
140
138
. open ( & test_path)
141
139
. and_then ( |mut f| f. write ( SCRIPT_CONTENTS ) )
142
- . unwrap_or_else ( |e| panic ! ( "write failed: {}" , e ) ) ;
140
+ . unwrap_or_else ( |e| panic ! ( "write failed: {e}" ) ) ;
143
141
144
142
// Verify that we cannot execute despite a+x permissions being set.
145
143
let mode = stat:: Mode :: from_bits_truncate (
146
144
fs:: metadata ( & test_path)
147
145
. map ( |md| md. permissions ( ) . mode ( ) )
148
- . unwrap_or_else ( |e| panic ! ( "metadata failed: {}" , e ) ) ,
146
+ . unwrap_or_else ( |e| panic ! ( "metadata failed: {e}" ) ) ,
149
147
) ;
150
148
151
149
assert ! (
@@ -164,8 +162,7 @@ exit 23";
164
162
. unwrap( )
165
163
) ;
166
164
167
- umount ( tempdir. path ( ) )
168
- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e) ) ;
165
+ umount ( tempdir. path ( ) ) . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
169
166
}
170
167
171
168
pub fn test_mount_bind ( ) {
@@ -182,18 +179,18 @@ exit 23";
182
179
MsFlags :: MS_BIND ,
183
180
NONE ,
184
181
)
185
- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
182
+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
186
183
187
184
fs:: OpenOptions :: new ( )
188
185
. create ( true )
189
186
. write ( true )
190
187
. mode ( ( Mode :: S_IRWXU | Mode :: S_IRWXG | Mode :: S_IRWXO ) . bits ( ) )
191
188
. open ( mount_point. path ( ) . join ( file_name) )
192
189
. and_then ( |mut f| f. write ( SCRIPT_CONTENTS ) )
193
- . unwrap_or_else ( |e| panic ! ( "write failed: {}" , e ) ) ;
190
+ . unwrap_or_else ( |e| panic ! ( "write failed: {e}" ) ) ;
194
191
195
192
umount ( mount_point. path ( ) )
196
- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e ) ) ;
193
+ . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
197
194
}
198
195
199
196
// Verify the file written in the mount shows up in source directory, even
@@ -202,7 +199,7 @@ exit 23";
202
199
let mut buf = Vec :: new ( ) ;
203
200
File :: open ( tempdir. path ( ) . join ( file_name) )
204
201
. and_then ( |mut f| f. read_to_end ( & mut buf) )
205
- . unwrap_or_else ( |e| panic ! ( "read failed: {}" , e ) ) ;
202
+ . unwrap_or_else ( |e| panic ! ( "read failed: {e}" ) ) ;
206
203
assert_eq ! ( buf, SCRIPT_CONTENTS ) ;
207
204
}
208
205
@@ -214,8 +211,7 @@ exit 23";
214
211
let stderr = io:: stderr ( ) ;
215
212
let mut handle = stderr. lock ( ) ;
216
213
writeln ! ( handle,
217
- "unshare failed: {}. Are unprivileged user namespaces available?" ,
218
- e) . unwrap ( ) ;
214
+ "unshare failed: {e}. Are unprivileged user namespaces available?" ) . unwrap ( ) ;
219
215
writeln ! ( handle, "mount is not being tested" ) . unwrap ( ) ;
220
216
// Exit with success because not all systems support unprivileged user namespaces, and
221
217
// that's not what we're testing for.
@@ -226,8 +222,8 @@ exit 23";
226
222
fs:: OpenOptions :: new ( )
227
223
. write ( true )
228
224
. open ( "/proc/self/uid_map" )
229
- . and_then ( |mut f| f. write ( format ! ( "1000 {} 1\n " , uid ) . as_bytes ( ) ) )
230
- . unwrap_or_else ( |e| panic ! ( "could not write uid map: {}" , e ) ) ;
225
+ . and_then ( |mut f| f. write ( format ! ( "1000 {uid } 1\n " ) . as_bytes ( ) ) )
226
+ . unwrap_or_else ( |e| panic ! ( "could not write uid map: {e}" ) ) ;
231
227
}
232
228
}
233
229
0 commit comments