@@ -38,7 +38,7 @@ exit 23";
3838 MsFlags :: empty ( ) ,
3939 NONE ,
4040 )
41- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
41+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
4242
4343 let test_path = tempdir. path ( ) . join ( "test" ) ;
4444
@@ -67,31 +67,30 @@ exit 23";
6767 . unwrap ( ) ;
6868 process:: exit ( 0 ) ;
6969 } else {
70- panic ! ( "open failed: {}" , e ) ;
70+ panic ! ( "open failed: {e}" ) ;
7171 }
7272 } )
7373 . and_then ( |mut f| f. write ( SCRIPT_CONTENTS ) )
74- . unwrap_or_else ( |e| panic ! ( "write failed: {}" , e ) ) ;
74+ . unwrap_or_else ( |e| panic ! ( "write failed: {e}" ) ) ;
7575
7676 // Verify read.
7777 let mut buf = Vec :: new ( ) ;
7878 File :: open ( & test_path)
7979 . and_then ( |mut f| f. read_to_end ( & mut buf) )
80- . unwrap_or_else ( |e| panic ! ( "read failed: {}" , e ) ) ;
80+ . unwrap_or_else ( |e| panic ! ( "read failed: {e}" ) ) ;
8181 assert_eq ! ( buf, SCRIPT_CONTENTS ) ;
8282
8383 // Verify execute.
8484 assert_eq ! (
8585 EXPECTED_STATUS ,
8686 Command :: new( & test_path)
8787 . status( )
88- . unwrap_or_else( |e| panic!( "exec failed: {}" , e ) )
88+ . unwrap_or_else( |e| panic!( "exec failed: {e}" ) )
8989 . code( )
9090 . unwrap_or_else( || panic!( "child killed by signal" ) )
9191 ) ;
9292
93- umount ( tempdir. path ( ) )
94- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e) ) ;
93+ umount ( tempdir. path ( ) ) . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
9594 }
9695
9796 pub fn test_mount_rdonly_disallows_write ( ) {
@@ -104,7 +103,7 @@ exit 23";
104103 MsFlags :: MS_RDONLY ,
105104 NONE ,
106105 )
107- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
106+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
108107
109108 // EROFS: Read-only file system
110109 assert_eq ! (
@@ -115,8 +114,7 @@ exit 23";
115114 . unwrap( )
116115 ) ;
117116
118- umount ( tempdir. path ( ) )
119- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e) ) ;
117+ umount ( tempdir. path ( ) ) . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
120118 }
121119
122120 pub fn test_mount_noexec_disallows_exec ( ) {
@@ -129,7 +127,7 @@ exit 23";
129127 MsFlags :: MS_NOEXEC ,
130128 NONE ,
131129 )
132- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
130+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
133131
134132 let test_path = tempdir. path ( ) . join ( "test" ) ;
135133
@@ -139,13 +137,13 @@ exit 23";
139137 . mode ( ( Mode :: S_IRWXU | Mode :: S_IRWXG | Mode :: S_IRWXO ) . bits ( ) )
140138 . open ( & test_path)
141139 . and_then ( |mut f| f. write ( SCRIPT_CONTENTS ) )
142- . unwrap_or_else ( |e| panic ! ( "write failed: {}" , e ) ) ;
140+ . unwrap_or_else ( |e| panic ! ( "write failed: {e}" ) ) ;
143141
144142 // Verify that we cannot execute despite a+x permissions being set.
145143 let mode = stat:: Mode :: from_bits_truncate (
146144 fs:: metadata ( & test_path)
147145 . map ( |md| md. permissions ( ) . mode ( ) )
148- . unwrap_or_else ( |e| panic ! ( "metadata failed: {}" , e ) ) ,
146+ . unwrap_or_else ( |e| panic ! ( "metadata failed: {e}" ) ) ,
149147 ) ;
150148
151149 assert ! (
@@ -164,8 +162,7 @@ exit 23";
164162 . unwrap( )
165163 ) ;
166164
167- umount ( tempdir. path ( ) )
168- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e) ) ;
165+ umount ( tempdir. path ( ) ) . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
169166 }
170167
171168 pub fn test_mount_bind ( ) {
@@ -182,18 +179,18 @@ exit 23";
182179 MsFlags :: MS_BIND ,
183180 NONE ,
184181 )
185- . unwrap_or_else ( |e| panic ! ( "mount failed: {}" , e ) ) ;
182+ . unwrap_or_else ( |e| panic ! ( "mount failed: {e}" ) ) ;
186183
187184 fs:: OpenOptions :: new ( )
188185 . create ( true )
189186 . write ( true )
190187 . mode ( ( Mode :: S_IRWXU | Mode :: S_IRWXG | Mode :: S_IRWXO ) . bits ( ) )
191188 . open ( mount_point. path ( ) . join ( file_name) )
192189 . and_then ( |mut f| f. write ( SCRIPT_CONTENTS ) )
193- . unwrap_or_else ( |e| panic ! ( "write failed: {}" , e ) ) ;
190+ . unwrap_or_else ( |e| panic ! ( "write failed: {e}" ) ) ;
194191
195192 umount ( mount_point. path ( ) )
196- . unwrap_or_else ( |e| panic ! ( "umount failed: {}" , e ) ) ;
193+ . unwrap_or_else ( |e| panic ! ( "umount failed: {e}" ) ) ;
197194 }
198195
199196 // Verify the file written in the mount shows up in source directory, even
@@ -202,7 +199,7 @@ exit 23";
202199 let mut buf = Vec :: new ( ) ;
203200 File :: open ( tempdir. path ( ) . join ( file_name) )
204201 . and_then ( |mut f| f. read_to_end ( & mut buf) )
205- . unwrap_or_else ( |e| panic ! ( "read failed: {}" , e ) ) ;
202+ . unwrap_or_else ( |e| panic ! ( "read failed: {e}" ) ) ;
206203 assert_eq ! ( buf, SCRIPT_CONTENTS ) ;
207204 }
208205
@@ -214,8 +211,7 @@ exit 23";
214211 let stderr = io:: stderr ( ) ;
215212 let mut handle = stderr. lock ( ) ;
216213 writeln ! ( handle,
217- "unshare failed: {}. Are unprivileged user namespaces available?" ,
218- e) . unwrap ( ) ;
214+ "unshare failed: {e}. Are unprivileged user namespaces available?" ) . unwrap ( ) ;
219215 writeln ! ( handle, "mount is not being tested" ) . unwrap ( ) ;
220216 // Exit with success because not all systems support unprivileged user namespaces, and
221217 // that's not what we're testing for.
@@ -226,8 +222,8 @@ exit 23";
226222 fs:: OpenOptions :: new ( )
227223 . write ( true )
228224 . open ( "/proc/self/uid_map" )
229- . and_then ( |mut f| f. write ( format ! ( "1000 {} 1\n " , uid ) . as_bytes ( ) ) )
230- . unwrap_or_else ( |e| panic ! ( "could not write uid map: {}" , e ) ) ;
225+ . and_then ( |mut f| f. write ( format ! ( "1000 {uid } 1\n " ) . as_bytes ( ) ) )
226+ . unwrap_or_else ( |e| panic ! ( "could not write uid map: {e}" ) ) ;
231227 }
232228}
233229
0 commit comments