mirror of
				https://github.com/meilisearch/meilisearch.git
				synced 2025-10-27 05:56:26 +00:00 
			
		
		
		
	remove a lot of unecessary clone and ref
This commit is contained in:
		
				
					committed by
					
						 Clément Renault
						Clément Renault
					
				
			
			
				
	
			
			
			
						parent
						
							4d25c159e6
						
					
				
				
					commit
					7e52f1effb
				
			| @@ -96,7 +96,7 @@ async fn error_access_expired_key() { | ||||
|     assert!(response["key"].is_string()); | ||||
|  | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     // wait until the key is expired. | ||||
|     thread::sleep(time::Duration::new(1, 0)); | ||||
| @@ -126,7 +126,7 @@ async fn error_access_unauthorized_index() { | ||||
|     assert!(response["key"].is_string()); | ||||
|  | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     for (method, route) in AUTHORIZATIONS | ||||
|         .keys() | ||||
| @@ -160,7 +160,7 @@ async fn error_access_unauthorized_action() { | ||||
|         assert!(response["key"].is_string()); | ||||
|  | ||||
|         let key = response["key"].as_str().unwrap(); | ||||
|         server.use_api_key(&key); | ||||
|         server.use_api_key(key); | ||||
|         let (response, code) = server.dummy_request(method, route).await; | ||||
|  | ||||
|         assert_eq!(response, INVALID_RESPONSE.clone(), "on route: {:?} - {:?}", method, route); | ||||
| @@ -203,7 +203,7 @@ async fn access_authorized_restricted_index() { | ||||
|             assert!(response["key"].is_string()); | ||||
|  | ||||
|             let key = response["key"].as_str().unwrap(); | ||||
|             server.use_api_key(&key); | ||||
|             server.use_api_key(key); | ||||
|  | ||||
|             let (response, code) = server.dummy_request(method, route).await; | ||||
|  | ||||
| @@ -241,7 +241,7 @@ async fn access_authorized_no_index_restriction() { | ||||
|             assert!(response["key"].is_string()); | ||||
|  | ||||
|             let key = response["key"].as_str().unwrap(); | ||||
|             server.use_api_key(&key); | ||||
|             server.use_api_key(key); | ||||
|  | ||||
|             let (response, code) = server.dummy_request(method, route).await; | ||||
|  | ||||
| @@ -286,7 +286,7 @@ async fn access_authorized_stats_restricted_index() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let (response, code) = server.stats().await; | ||||
|     assert_eq!(200, code, "{:?}", &response); | ||||
| @@ -326,7 +326,7 @@ async fn access_authorized_stats_no_index_restriction() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let (response, code) = server.stats().await; | ||||
|     assert_eq!(200, code, "{:?}", &response); | ||||
| @@ -366,7 +366,7 @@ async fn list_authorized_indexes_restricted_index() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let (response, code) = server.list_indexes(None, None).await; | ||||
|     assert_eq!(200, code, "{:?}", &response); | ||||
| @@ -407,7 +407,7 @@ async fn list_authorized_indexes_no_index_restriction() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let (response, code) = server.list_indexes(None, None).await; | ||||
|     assert_eq!(200, code, "{:?}", &response); | ||||
| @@ -447,7 +447,7 @@ async fn list_authorized_tasks_restricted_index() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let (response, code) = server.service.get("/tasks").await; | ||||
|     assert_eq!(200, code, "{:?}", &response); | ||||
| @@ -487,7 +487,7 @@ async fn list_authorized_tasks_no_index_restriction() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let (response, code) = server.service.get("/tasks").await; | ||||
|     assert_eq!(200, code, "{:?}", &response); | ||||
| @@ -518,7 +518,7 @@ async fn error_creating_index_without_action() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     let expected_error = json!({ | ||||
|         "message": "Index `test` not found.", | ||||
| @@ -598,7 +598,7 @@ async fn lazy_create_index() { | ||||
|  | ||||
|         // use created key. | ||||
|         let key = response["key"].as_str().unwrap(); | ||||
|         server.use_api_key(&key); | ||||
|         server.use_api_key(key); | ||||
|  | ||||
|         // try to create a index via add documents route | ||||
|         let index = server.index("test"); | ||||
| @@ -665,7 +665,7 @@ async fn error_creating_index_without_index() { | ||||
|  | ||||
|     // use created key. | ||||
|     let key = response["key"].as_str().unwrap(); | ||||
|     server.use_api_key(&key); | ||||
|     server.use_api_key(key); | ||||
|  | ||||
|     // try to create a index via add documents route | ||||
|     let index = server.index("test"); | ||||
|   | ||||
| @@ -470,7 +470,7 @@ async fn error_access_forbidden_routes() { | ||||
|         "searchRules" => json!(["*"]), | ||||
|         "exp" => json!((OffsetDateTime::now_utc() + Duration::hours(1)).unix_timestamp()) | ||||
|     }; | ||||
|     let web_token = generate_tenant_token(&uid, &key, tenant_token); | ||||
|     let web_token = generate_tenant_token(uid, key, tenant_token); | ||||
|     server.use_api_key(&web_token); | ||||
|  | ||||
|     for ((method, route), actions) in AUTHORIZATIONS.iter() { | ||||
| @@ -506,7 +506,7 @@ async fn error_access_expired_parent_key() { | ||||
|         "searchRules" => json!(["*"]), | ||||
|         "exp" => json!((OffsetDateTime::now_utc() + Duration::hours(1)).unix_timestamp()) | ||||
|     }; | ||||
|     let web_token = generate_tenant_token(&uid, &key, tenant_token); | ||||
|     let web_token = generate_tenant_token(uid, key, tenant_token); | ||||
|     server.use_api_key(&web_token); | ||||
|  | ||||
|     // test search request while parent_key is not expired | ||||
| @@ -545,7 +545,7 @@ async fn error_access_modified_token() { | ||||
|         "searchRules" => json!(["products"]), | ||||
|         "exp" => json!((OffsetDateTime::now_utc() + Duration::hours(1)).unix_timestamp()) | ||||
|     }; | ||||
|     let web_token = generate_tenant_token(&uid, &key, tenant_token); | ||||
|     let web_token = generate_tenant_token(uid, key, tenant_token); | ||||
|     server.use_api_key(&web_token); | ||||
|  | ||||
|     // test search request while web_token is valid | ||||
| @@ -558,7 +558,7 @@ async fn error_access_modified_token() { | ||||
|         "exp" => json!((OffsetDateTime::now_utc() + Duration::hours(1)).unix_timestamp()) | ||||
|     }; | ||||
|  | ||||
|     let alt = generate_tenant_token(&uid, &key, tenant_token); | ||||
|     let alt = generate_tenant_token(uid, key, tenant_token); | ||||
|     let altered_token = [ | ||||
|         web_token.split('.').next().unwrap(), | ||||
|         alt.split('.').nth(1).unwrap(), | ||||
|   | ||||
		Reference in New Issue
	
	Block a user