about summary refs log tree commit diff
path: root/kittybox-rs/src/indieauth
diff options
context:
space:
mode:
authorVika <vika@fireburn.ru>2022-07-22 06:02:46 +0300
committerVika <vika@fireburn.ru>2022-07-22 06:02:46 +0300
commite2bbf451ad2eb6f21f8ec55aafaafa6aa7bd25f4 (patch)
treefcc4d7d865d6ee05000d6c7ab57e094fb4576283 /kittybox-rs/src/indieauth
parentecdb6c7db16406a20b56e7bb6e73d4c59ee246f1 (diff)
downloadkittybox-e2bbf451ad2eb6f21f8ec55aafaafa6aa7bd25f4.tar.zst
kittybox-indieauth: axum helpers for responses
Some responses need to set Cache-Control and Pragma: no-cache headers according to RFC 6749.
Diffstat (limited to 'kittybox-rs/src/indieauth')
-rw-r--r--kittybox-rs/src/indieauth/mod.rs26
1 files changed, 13 insertions, 13 deletions
diff --git a/kittybox-rs/src/indieauth/mod.rs b/kittybox-rs/src/indieauth/mod.rs
index 12c9bab..70b909a 100644
--- a/kittybox-rs/src/indieauth/mod.rs
+++ b/kittybox-rs/src/indieauth/mod.rs
@@ -85,7 +85,7 @@ async fn authorization_endpoint_post<A: AuthBackend>(
                 Ok(code) => code,
                 Err(err) => {
                     tracing::error!("Error creating authorization code: {}", err);
-                    return IntoResponse::into_response(StatusCode::INTERNAL_SERVER_ERROR);
+                    return StatusCode::INTERNAL_SERVER_ERROR.into_response();
                 }
             };
 
@@ -101,10 +101,10 @@ async fn authorization_endpoint_post<A: AuthBackend>(
                 uri
             };
 
-            IntoResponse::into_response((
-                StatusCode::FOUND,
-                [("Location", redirect_uri.as_str())]
-            ))
+            (StatusCode::FOUND,
+             [("Location", redirect_uri.as_str())]
+            )
+                .into_response()
         },
         Grant(grant) => match grant {
             GrantRequest::AuthorizationCode { code, client_id, redirect_uri, code_verifier } => {
@@ -152,7 +152,7 @@ async fn authorization_endpoint_post<A: AuthBackend>(
                 };
                 let me = format!("https://{}/", host).parse().unwrap();
 
-                Json(GrantResponse::ProfileUrl { me, profile }).into_response()
+                GrantResponse::ProfileUrl { me, profile }.into_response()
             },
             _ => Error {
                 kind: ErrorKind::InvalidGrant,
@@ -277,13 +277,13 @@ async fn token_endpoint_post<A: AuthBackend>(
                 }
             };
 
-            Json(GrantResponse::AccessToken {
+            GrantResponse::AccessToken {
                 me,
                 profile,
                 access_token,
                 expires_in: Some(ACCESS_TOKEN_VALIDITY),
                 refresh_token: Some(refresh_token)
-            }).into_response()
+            }.into_response()
         },
         GrantRequest::RefreshToken { refresh_token, client_id, scope } => {
             let data = match backend.get_refresh_token(&refresh_token).await {
@@ -354,13 +354,13 @@ async fn token_endpoint_post<A: AuthBackend>(
                 return StatusCode::INTERNAL_SERVER_ERROR.into_response();
             }
             
-            Json(GrantResponse::AccessToken {
+            GrantResponse::AccessToken {
                 me: data.me,
                 profile,
                 access_token,
                 expires_in: Some(ACCESS_TOKEN_VALIDITY),
                 refresh_token: Some(refresh_token)
-            }).into_response()
+            }.into_response()
         }
     }
 }
@@ -379,7 +379,7 @@ async fn introspection_endpoint_post<A: AuthBackend>(
         }
     };
 
-    Json(response).into_response()
+    response.into_response()
 }
 
 async fn revocation_endpoint_post<A: AuthBackend>(
@@ -404,12 +404,12 @@ async fn userinfo_endpoint_get<A: AuthBackend>(
     TypedHeader(Authorization(auth_token)): TypedHeader<Authorization<Bearer>>,
     Extension(backend): Extension<A>
 ) -> Response {
-    Json(Profile {
+    Profile {
         name: todo!(),
         url: todo!(),
         photo: todo!(),
         email: Some(todo!())
-    }).into_response()
+    }.into_response()
 }
 
 pub fn router<A: AuthBackend>(backend: A) -> axum::Router {