From d381478b2986eb15ce4ec40132a60a4c617ea48b Mon Sep 17 00:00:00 2001 From: Marco Allegretti Date: Thu, 12 Feb 2026 12:38:15 +0100 Subject: [PATCH] ci: fix clippy warning in tests --- backend/src/main.rs | 12 ++++++--- backend/src/rate_limit.rs | 54 +++++++++++++++++++++------------------ 2 files changed, 37 insertions(+), 29 deletions(-) diff --git a/backend/src/main.rs b/backend/src/main.rs index 4a89ec3..24ea8f8 100644 --- a/backend/src/main.rs +++ b/backend/src/main.rs @@ -422,8 +422,10 @@ mod cors_tests { #[tokio::test] async fn cors_allowlist_only_allows_listed_origins() { - let mut cfg = Config::default(); - cfg.cors_allowed_origins = Some("https://a.example, https://b.example".to_string()); + let cfg = Config { + cors_allowed_origins: Some("https://a.example, https://b.example".to_string()), + ..Default::default() + }; let app = Router::new() .route("/api/ping", get(|| async { "ok" })) .layer(build_cors_layer(&cfg)); @@ -460,8 +462,10 @@ mod cors_tests { #[tokio::test] async fn cors_preflight_responds_for_allowed_origin() { - let mut cfg = Config::default(); - cfg.cors_allowed_origins = Some("https://a.example".to_string()); + let cfg = Config { + cors_allowed_origins: Some("https://a.example".to_string()), + ..Default::default() + }; let app = Router::new() .route("/api/ping", get(|| async { "ok" })) .layer(build_cors_layer(&cfg)); diff --git a/backend/src/rate_limit.rs b/backend/src/rate_limit.rs index 905a427..b2bd097 100644 --- a/backend/src/rate_limit.rs +++ b/backend/src/rate_limit.rs @@ -242,12 +242,13 @@ mod tests { #[tokio::test] async fn middleware_bypasses_health() { - let mut cfg = Config::default(); - cfg.rate_limit_enabled = true; - cfg.rate_limit_ip_rpm = 1; - cfg.rate_limit_user_rpm = 0; - cfg.rate_limit_auth_rpm = 0; - let cfg = Arc::new(cfg); + let cfg = Arc::new(Config { + rate_limit_enabled: true, + rate_limit_ip_rpm: 1, + rate_limit_user_rpm: 0, + rate_limit_auth_rpm: 0, + ..Default::default() + }); let app = Router::new() .route("/health", get(|| async { "ok" })) @@ -270,12 +271,13 @@ mod tests { #[tokio::test] async fn middleware_enforces_ip_rate_limit() { - let mut cfg = Config::default(); - cfg.rate_limit_enabled = true; - cfg.rate_limit_ip_rpm = 2; - cfg.rate_limit_user_rpm = 0; - cfg.rate_limit_auth_rpm = 0; - let cfg = Arc::new(cfg); + let cfg = Arc::new(Config { + rate_limit_enabled: true, + rate_limit_ip_rpm: 2, + rate_limit_user_rpm: 0, + rate_limit_auth_rpm: 0, + ..Default::default() + }); let app = Router::new() .route("/api/ping", get(|| async { "ok" })) @@ -308,12 +310,13 @@ mod tests { #[tokio::test] async fn middleware_enforces_auth_rate_limit_on_login() { - let mut cfg = Config::default(); - cfg.rate_limit_enabled = true; - cfg.rate_limit_ip_rpm = 0; - cfg.rate_limit_user_rpm = 0; - cfg.rate_limit_auth_rpm = 1; - let cfg = Arc::new(cfg); + let cfg = Arc::new(Config { + rate_limit_enabled: true, + rate_limit_ip_rpm: 0, + rate_limit_user_rpm: 0, + rate_limit_auth_rpm: 1, + ..Default::default() + }); let app = Router::new() .route("/api/auth/login", get(|| async { "ok" })) @@ -344,13 +347,14 @@ mod tests { #[tokio::test] async fn middleware_enforces_user_rate_limit_when_token_is_valid() { - let mut cfg = Config::default(); - cfg.rate_limit_enabled = true; - cfg.rate_limit_ip_rpm = 0; - cfg.rate_limit_user_rpm = 1; - cfg.rate_limit_auth_rpm = 0; - cfg.jwt_secret = "testsecret".to_string(); - let cfg = Arc::new(cfg); + let cfg = Arc::new(Config { + rate_limit_enabled: true, + rate_limit_ip_rpm: 0, + rate_limit_user_rpm: 1, + rate_limit_auth_rpm: 0, + jwt_secret: "testsecret".to_string(), + ..Default::default() + }); let user_id = Uuid::new_v4(); let token = create_token(user_id, "u", &cfg.jwt_secret).unwrap();