From: Maximiliano Sandoval <m.sandoval@proxmox.com>
To: pbs-devel@lists.proxmox.com
Subject: [pbs-devel] [PATCH proxmox 07/10] cargo: run fmt again
Date: Mon, 26 Jan 2026 16:13:44 +0100 [thread overview]
Message-ID: <20260126151349.627829-8-m.sandoval@proxmox.com> (raw)
In-Reply-To: <20260126151349.627829-1-m.sandoval@proxmox.com>
Signed-off-by: Maximiliano Sandoval <m.sandoval@proxmox.com>
---
pbs-api-types/src/maintenance.rs | 7 +-
proxmox-api-macro/src/api/enums.rs | 21 +++---
proxmox-api-macro/src/api/method.rs | 43 ++++++------
proxmox-api-macro/src/serde.rs | 7 +-
proxmox-api-macro/src/util.rs | 36 +++++-----
proxmox-apt/src/cache.rs | 7 +-
proxmox-apt/src/cache_api.rs | 7 +-
proxmox-apt/src/deb822/release_file.rs | 9 +--
proxmox-apt/src/repositories/file.rs | 13 ++--
.../src/repositories/file/list_parser.rs | 9 +--
proxmox-apt/src/repositories/repository.rs | 7 +-
proxmox-config-digest/src/lib.rs | 7 +-
proxmox-ldap/src/sync.rs | 6 +-
proxmox-rrd/src/cache/journal.rs | 17 ++---
proxmox-section-config/src/lib.rs | 9 +--
proxmox-section-config/src/typed.rs | 7 +-
proxmox-tfa/src/api/mod.rs | 68 +++++++++----------
proxmox-tfa/src/api/webauthn.rs | 7 +-
pve-api-types/src/types/array.rs | 17 ++---
pve-api-types/src/types/verifiers.rs | 8 ++-
20 files changed, 168 insertions(+), 144 deletions(-)
diff --git a/pbs-api-types/src/maintenance.rs b/pbs-api-types/src/maintenance.rs
index 404d2c32..baf4e29a 100644
--- a/pbs-api-types/src/maintenance.rs
+++ b/pbs-api-types/src/maintenance.rs
@@ -111,9 +111,10 @@ impl MaintenanceMode {
} else if self.ty == MaintenanceType::S3Refresh {
bail!("S3 refresh maintenance mode: {}", message);
} else if self.ty == MaintenanceType::ReadOnly
- && let Some(Operation::Write) = operation {
- bail!("read-only maintenance mode: {}", message);
- }
+ && let Some(Operation::Write) = operation
+ {
+ bail!("read-only maintenance mode: {}", message);
+ }
Ok(())
}
}
diff --git a/proxmox-api-macro/src/api/enums.rs b/proxmox-api-macro/src/api/enums.rs
index 378e7f05..483686f2 100644
--- a/proxmox-api-macro/src/api/enums.rs
+++ b/proxmox-api-macro/src/api/enums.rs
@@ -138,18 +138,19 @@ fn handle_string_enum(
};
if derives_default
- && let Some(attr) = variant.attrs.iter().find(|a| a.path().is_ident("default")) {
- if let Some(default_value) = &default_value {
- error!(attr => "multiple default values defined");
- error!(default_value => "default previously defined here");
- } else {
- default_value = Some(variant_string.clone());
- if let Some(span) = has_default_attrib {
- error!(attr => "#[default] attribute in use with 'default' #[api] key");
- error!(span, "'default' also defined here");
- }
+ && let Some(attr) = variant.attrs.iter().find(|a| a.path().is_ident("default"))
+ {
+ if let Some(default_value) = &default_value {
+ error!(attr => "multiple default values defined");
+ error!(default_value => "default previously defined here");
+ } else {
+ default_value = Some(variant_string.clone());
+ if let Some(span) = has_default_attrib {
+ error!(attr => "#[default] attribute in use with 'default' #[api] key");
+ error!(span, "'default' also defined here");
}
}
+ }
variants.extend(quote_spanned! { variant.ident.span() =>
::proxmox_schema::EnumEntry {
diff --git a/proxmox-api-macro/src/api/method.rs b/proxmox-api-macro/src/api/method.rs
index c55a21d4..fdea5f35 100644
--- a/proxmox-api-macro/src/api/method.rs
+++ b/proxmox-api-macro/src/api/method.rs
@@ -494,24 +494,26 @@ fn handle_function_signature(method_info: &mut MethodInfo) -> Result<Ident, Erro
fn is_api_method_type(ty: &syn::Type) -> bool {
if let syn::Type::Reference(r) = ty
- && let syn::Type::Path(p) = &*r.elem {
- if p.qself.is_some() {
- return false;
- }
- if let Some(ps) = p.path.segments.last() {
- return ps.ident == "ApiMethod";
- }
+ && let syn::Type::Path(p) = &*r.elem
+ {
+ if p.qself.is_some() {
+ return false;
}
+ if let Some(ps) = p.path.segments.last() {
+ return ps.ident == "ApiMethod";
+ }
+ }
false
}
fn is_rpc_env_type(ty: &syn::Type) -> bool {
if let syn::Type::Reference(r) = ty
&& let syn::Type::TraitObject(t) = &*r.elem
- && let Some(syn::TypeParamBound::Trait(b)) = t.bounds.first()
- && let Some(ps) = b.path.segments.last() {
- return ps.ident == "RpcEnvironment";
- }
+ && let Some(syn::TypeParamBound::Trait(b)) = t.bounds.first()
+ && let Some(ps) = b.path.segments.last()
+ {
+ return ps.ident == "RpcEnvironment";
+ }
false
}
@@ -942,17 +944,18 @@ struct DefaultParameters<'a>(&'a Schema);
impl VisitMut for DefaultParameters<'_> {
fn visit_expr_mut(&mut self, i: &mut syn::Expr) {
if let syn::Expr::Macro(exprmac) = i
- && exprmac.mac.path.is_ident("api_get_default") {
- // replace api_get_default macros with the actual default found in the #[api]
- // macro.
- match self.get_default(mem::take(&mut exprmac.mac.tokens)) {
- Ok(expr) => *i = expr,
- Err(err) => {
- *i = syn::Expr::Verbatim(err.to_compile_error());
- return;
- }
+ && exprmac.mac.path.is_ident("api_get_default")
+ {
+ // replace api_get_default macros with the actual default found in the #[api]
+ // macro.
+ match self.get_default(mem::take(&mut exprmac.mac.tokens)) {
+ Ok(expr) => *i = expr,
+ Err(err) => {
+ *i = syn::Expr::Verbatim(err.to_compile_error());
+ return;
}
}
+ }
visit_mut::visit_expr_mut(self, i)
}
diff --git a/proxmox-api-macro/src/serde.rs b/proxmox-api-macro/src/serde.rs
index 52dd8fed..345b3f2e 100644
--- a/proxmox-api-macro/src/serde.rs
+++ b/proxmox-api-macro/src/serde.rs
@@ -230,9 +230,10 @@ impl FieldAttrib {
pub fn check_non_option_type(&self) {
if let Some(span) = self.has_skip_serializing_if
- && !self.has_default {
- error!(span, "`skip_serializing_if` without `default`");
- }
+ && !self.has_default
+ {
+ error!(span, "`skip_serializing_if` without `default`");
+ }
}
}
diff --git a/proxmox-api-macro/src/util.rs b/proxmox-api-macro/src/util.rs
index 042684ff..db2acdf2 100644
--- a/proxmox-api-macro/src/util.rs
+++ b/proxmox-api-macro/src/util.rs
@@ -435,16 +435,17 @@ pub fn derive_descriptions(
let mut parts = doc_comment.split("\nReturns:");
if let Some(first) = parts.next()
- && input_schema.description.is_none() {
- input_schema.description = Maybe::Derived(syn::LitStr::new(first.trim(), doc_span));
- }
+ && input_schema.description.is_none()
+ {
+ input_schema.description = Maybe::Derived(syn::LitStr::new(first.trim(), doc_span));
+ }
if let Some(second) = parts.next() {
if let Some(returns_schema) = returns_schema
- && returns_schema.description.is_none() {
- returns_schema.description =
- Maybe::Derived(syn::LitStr::new(second.trim(), doc_span));
- }
+ && returns_schema.description.is_none()
+ {
+ returns_schema.description = Maybe::Derived(syn::LitStr::new(second.trim(), doc_span));
+ }
if parts.next().is_some() {
bail!(
@@ -519,9 +520,10 @@ pub fn is_option_type(ty: &syn::Type) -> Option<&syn::Type> {
if let syn::PathArguments::AngleBracketed(generic) = &segs.last().unwrap().arguments
&& generic.args.len() == 1
- && let syn::GenericArgument::Type(ty) = generic.args.first().unwrap() {
- return Some(ty);
- }
+ && let syn::GenericArgument::Type(ty) = generic.args.first().unwrap()
+ {
+ return Some(ty);
+ }
}
None
}
@@ -744,17 +746,19 @@ where
match arg {
Pair::Punctuated(item, punct) => {
if let syn::Meta::Path(path) = &item
- && !func(path) {
- continue;
- }
+ && !func(path)
+ {
+ continue;
+ }
args.push_value(item);
args.push_punct(punct);
}
Pair::End(item) => {
if let syn::Meta::Path(path) = &item
- && !func(path) {
- continue;
- }
+ && !func(path)
+ {
+ continue;
+ }
args.push_value(item);
}
}
diff --git a/proxmox-apt/src/cache.rs b/proxmox-apt/src/cache.rs
index bd12eb22..b27fa886 100644
--- a/proxmox-apt/src/cache.rs
+++ b/proxmox-apt/src/cache.rs
@@ -248,9 +248,10 @@ where
let mut pkg_iter = origin.file();
let pkg_file = pkg_iter.next();
if let Some(pkg_file) = pkg_file
- && let Some(origin_name) = pkg_file.origin() {
- origin_res = origin_name;
- }
+ && let Some(origin_name) = pkg_file.origin()
+ {
+ origin_res = origin_name;
+ }
}
if let Some(depends) = depends {
diff --git a/proxmox-apt/src/cache_api.rs b/proxmox-apt/src/cache_api.rs
index d2c7dbfc..771c69ee 100644
--- a/proxmox-apt/src/cache_api.rs
+++ b/proxmox-apt/src/cache_api.rs
@@ -14,9 +14,10 @@ pub fn list_available_apt_update<P: AsRef<Path>>(
) -> Result<Vec<APTUpdateInfo>, Error> {
let apt_state_file = apt_state_file.as_ref();
if let Ok(false) = crate::cache::pkg_cache_expired(apt_state_file)
- && let Ok(Some(cache)) = crate::cache::read_pkg_state(apt_state_file) {
- return Ok(cache.package_status);
- }
+ && let Ok(Some(cache)) = crate::cache::read_pkg_state(apt_state_file)
+ {
+ return Ok(cache.package_status);
+ }
let cache = crate::cache::update_cache(apt_state_file)?;
diff --git a/proxmox-apt/src/deb822/release_file.rs b/proxmox-apt/src/deb822/release_file.rs
index e5e9ed74..54e4afa8 100644
--- a/proxmox-apt/src/deb822/release_file.rs
+++ b/proxmox-apt/src/deb822/release_file.rs
@@ -151,10 +151,11 @@ impl FileReferenceType {
"debian-installer" => {
// another layer, then like regular repo but pointing at udebs
if let Some((dir, rest)) = rest.split_once('/')
- && let Some(arch) = dir.strip_prefix("binary-") {
- // Packages or compat-Release
- return parse_binary_dir(rest, arch);
- }
+ && let Some(arch) = dir.strip_prefix("binary-")
+ {
+ // Packages or compat-Release
+ return parse_binary_dir(rest, arch);
+ }
// all the rest
Ok(FileReferenceType::Unknown)
diff --git a/proxmox-apt/src/repositories/file.rs b/proxmox-apt/src/repositories/file.rs
index abf9e55e..b0e426c2 100644
--- a/proxmox-apt/src/repositories/file.rs
+++ b/proxmox-apt/src/repositories/file.rs
@@ -351,12 +351,13 @@ impl APTRepositoryFileImpl for APTRepositoryFile {
}
if let Some(require_suffix) = require_suffix
- && suffix != require_suffix {
- add_info(
- "warning",
- format!("expected suite '{current_codename}{require_suffix}'"),
- );
- }
+ && suffix != require_suffix
+ {
+ add_info(
+ "warning",
+ format!("expected suite '{current_codename}{require_suffix}'"),
+ );
+ }
}
}
diff --git a/proxmox-apt/src/repositories/file/list_parser.rs b/proxmox-apt/src/repositories/file/list_parser.rs
index b800473c..7a0e23a5 100644
--- a/proxmox-apt/src/repositories/file/list_parser.rs
+++ b/proxmox-apt/src/repositories/file/list_parser.rs
@@ -166,10 +166,11 @@ impl<R: BufRead> APTListFileParser<R> {
// check for commented out repository first
if let Some(commented_out) = line.strip_prefix('#')
- && let Ok(Some(mut repo)) = self.parse_one_line(commented_out) {
- repo.set_enabled(false);
- return Ok(Some(repo));
- }
+ && let Ok(Some(mut repo)) = self.parse_one_line(commented_out)
+ {
+ repo.set_enabled(false);
+ return Ok(Some(repo));
+ }
let mut repo = APTRepository::new(APTRepositoryFileType::List);
diff --git a/proxmox-apt/src/repositories/repository.rs b/proxmox-apt/src/repositories/repository.rs
index 4ec1c4e7..57fe16da 100644
--- a/proxmox-apt/src/repositories/repository.rs
+++ b/proxmox-apt/src/repositories/repository.rs
@@ -225,9 +225,10 @@ fn uri_to_filename(uri: &str) -> String {
}
if (uri.starts_with("http://") || uri.starts_with("https://"))
- && let Some(begin) = filename.find('@') {
- filename = &filename[(begin + 1)..];
- }
+ && let Some(begin) = filename.find('@')
+ {
+ filename = &filename[(begin + 1)..];
+ }
// APT seems to only strip one final slash, so do the same
filename = filename.strip_suffix('/').unwrap_or(filename);
diff --git a/proxmox-config-digest/src/lib.rs b/proxmox-config-digest/src/lib.rs
index 993e31cc..0b113f21 100644
--- a/proxmox-config-digest/src/lib.rs
+++ b/proxmox-config-digest/src/lib.rs
@@ -42,9 +42,10 @@ impl ConfigDigest {
/// This function fails with a reasonable error message if checksums do not match.
pub fn detect_modification(&self, user_digest: Option<&Self>) -> Result<(), Error> {
if let Some(user_digest) = user_digest
- && user_digest != self {
- bail!("detected modified configuration - file changed by other user? Try again.");
- }
+ && user_digest != self
+ {
+ bail!("detected modified configuration - file changed by other user? Try again.");
+ }
Ok(())
}
}
diff --git a/proxmox-ldap/src/sync.rs b/proxmox-ldap/src/sync.rs
index 87841ec3..e5bfdf3e 100644
--- a/proxmox-ldap/src/sync.rs
+++ b/proxmox-ldap/src/sync.rs
@@ -342,9 +342,9 @@ impl LdapRealmSyncJob {
if !self.dry_run
&& let Err(e) =
proxmox_access_control::token_shadow::delete_secret(&tokenid)
- {
- log::warn!("could not delete token for user {userid}: {e}",)
- }
+ {
+ log::warn!("could not delete token for user {userid}: {e}",)
+ }
if self.general_sync_settings.should_remove_acls() {
acl_config.delete_authid(&tokenid);
diff --git a/proxmox-rrd/src/cache/journal.rs b/proxmox-rrd/src/cache/journal.rs
index a78d06ee..80711021 100644
--- a/proxmox-rrd/src/cache/journal.rs
+++ b/proxmox-rrd/src/cache/journal.rs
@@ -172,14 +172,15 @@ impl JournalState {
if let Some(extension) = path.extension()
&& let Some(extension) = extension.to_str()
- && let Some(rest) = extension.strip_prefix("journal-")
- && let Ok(time) = u64::from_str_radix(rest, 16) {
- list.push(JournalFileInfo {
- time,
- name: format!("rrd.{extension}"),
- path: path.to_owned(),
- });
- }
+ && let Some(rest) = extension.strip_prefix("journal-")
+ && let Ok(time) = u64::from_str_radix(rest, 16)
+ {
+ list.push(JournalFileInfo {
+ time,
+ name: format!("rrd.{extension}"),
+ path: path.to_owned(),
+ });
+ }
}
list.sort_unstable_by_key(|entry| entry.time);
Ok(list)
diff --git a/proxmox-section-config/src/lib.rs b/proxmox-section-config/src/lib.rs
index 3fca933d..fec6a423 100644
--- a/proxmox-section-config/src/lib.rs
+++ b/proxmox-section-config/src/lib.rs
@@ -434,10 +434,11 @@ impl SectionConfig {
-> Result<(), Error> {
for (name, optional, _prop_schema) in schema.properties() {
if let Some(id_property) = id_property
- && name == id_property {
- // the id_property is the section header, skip for requirement check
- continue;
- }
+ && name == id_property
+ {
+ // the id_property is the section header, skip for requirement check
+ continue;
+ }
if !*optional && value[name] == Value::Null {
return Err(format_err!(
"property '{}' is missing and it is not optional.",
diff --git a/proxmox-section-config/src/typed.rs b/proxmox-section-config/src/typed.rs
index b06d290e..55cb3c75 100644
--- a/proxmox-section-config/src/typed.rs
+++ b/proxmox-section-config/src/typed.rs
@@ -216,9 +216,10 @@ impl<T> SectionConfigData<T> {
let removed_value = self.sections.remove(key);
// only update the order vector if we actually removed something
if removed_value.is_some()
- && let Some(pos) = self.order.iter().position(|k| k.borrow() == key) {
- self.order.remove(pos);
- }
+ && let Some(pos) = self.order.iter().position(|k| k.borrow() == key)
+ {
+ self.order.remove(pos);
+ }
removed_value
}
}
diff --git a/proxmox-tfa/src/api/mod.rs b/proxmox-tfa/src/api/mod.rs
index 5b2841be..f8188346 100644
--- a/proxmox-tfa/src/api/mod.rs
+++ b/proxmox-tfa/src/api/mod.rs
@@ -434,10 +434,9 @@ impl TfaConfig {
save = true;
}
- if save
- && let Err(err) = data.save() {
- log::error!("failed to store user challenge data: {err}");
- }
+ if save && let Err(err) = data.save() {
+ log::error!("failed to store user challenge data: {err}");
+ }
r
}
Ok(r) => r,
@@ -995,26 +994,26 @@ impl TfaUserData {
&& u2f
.auth_verify_obj(&entry.public_key, &challenge.challenge, response)?
.is_some()
- {
- let mut data = match access.open_no_create(userid)? {
- Some(data) => data,
- None => bail!("no such challenge"),
- };
- let index = data
- .get_mut()
- .u2f_auths
- .iter()
- .position(|r| r == challenge)
- .ok_or_else(|| format_err!("no such challenge"))?;
- let entry = data.get_mut().u2f_auths.remove(index);
- if entry.is_expired(expire_before) {
- bail!("no such challenge");
- }
- data.save()
- .map_err(|err| format_err!("failed to save challenge file: {}", err))?;
-
- return Ok(());
+ {
+ let mut data = match access.open_no_create(userid)? {
+ Some(data) => data,
+ None => bail!("no such challenge"),
+ };
+ let index = data
+ .get_mut()
+ .u2f_auths
+ .iter()
+ .position(|r| r == challenge)
+ .ok_or_else(|| format_err!("no such challenge"))?;
+ let entry = data.get_mut().u2f_auths.remove(index);
+ if entry.is_expired(expire_before) {
+ bail!("no such challenge");
}
+ data.save()
+ .map_err(|err| format_err!("failed to save challenge file: {}", err))?;
+
+ return Ok(());
+ }
bail!("u2f verification failed");
}
@@ -1087,19 +1086,20 @@ impl TfaUserData {
value: &str,
) -> Result<(), Error> {
if let Some(r) = &mut self.recovery
- && r.verify(value)? {
- // On success we reset the failure state.
- self.totp_locked = false;
- self.tfa_locked_until = None;
+ && r.verify(value)?
+ {
+ // On success we reset the failure state.
+ self.totp_locked = false;
+ self.tfa_locked_until = None;
- let mut data = access.open(userid)?;
- let access = data.get_mut();
- if access.totp_failures != 0 {
- access.totp_failures = 0;
- data.save()?;
- }
- return Ok(());
+ let mut data = access.open(userid)?;
+ let access = data.get_mut();
+ if access.totp_failures != 0 {
+ access.totp_failures = 0;
+ data.save()?;
}
+ return Ok(());
+ }
bail!("recovery verification failed");
}
diff --git a/proxmox-tfa/src/api/webauthn.rs b/proxmox-tfa/src/api/webauthn.rs
index 8343d721..8c08401c 100644
--- a/proxmox-tfa/src/api/webauthn.rs
+++ b/proxmox-tfa/src/api/webauthn.rs
@@ -197,9 +197,10 @@ fn force_allow_backup_eligibility(
let mut state =
serde_json::to_value(&state).context("failed to convert authentication state to json")?;
if let Some(obj) = state.get_mut("ast")
- && let Some(allow) = obj.get_mut("allow_backup_eligible_upgrade") {
- *allow = serde_json::Value::Bool(true);
- }
+ && let Some(allow) = obj.get_mut("allow_backup_eligible_upgrade")
+ {
+ *allow = serde_json::Value::Bool(true);
+ }
serde_json::from_value(state).context("failed to convert json back to authentication state")
}
diff --git a/pve-api-types/src/types/array.rs b/pve-api-types/src/types/array.rs
index 75a98af4..1465c5f2 100644
--- a/pve-api-types/src/types/array.rs
+++ b/pve-api-types/src/types/array.rs
@@ -175,15 +175,16 @@ impl<T, const MAX: usize> ArrayMap<T, { MAX }> {
while let Some((key, value)) = map.next_entry::<std::borrow::Cow<str>, T>()? {
if let Some(id) = key.as_ref().strip_prefix(self.prefix)
- && let Ok(id) = id.parse::<usize>() {
- if this.insert(id, value).map_err(A::Error::custom)?.is_some() {
- return Err(A::Error::custom(format!(
- "multiple '{}{id}' elements",
- self.prefix
- )));
- }
- continue;
+ && let Ok(id) = id.parse::<usize>()
+ {
+ if this.insert(id, value).map_err(A::Error::custom)?.is_some() {
+ return Err(A::Error::custom(format!(
+ "multiple '{}{id}' elements",
+ self.prefix
+ )));
}
+ continue;
+ }
return Err(A::Error::custom(format!(
"invalid array element name {key}"
)));
diff --git a/pve-api-types/src/types/verifiers.rs b/pve-api-types/src/types/verifiers.rs
index 18d16470..25098b6f 100644
--- a/pve-api-types/src/types/verifiers.rs
+++ b/pve-api-types/src/types/verifiers.rs
@@ -218,9 +218,11 @@ pub fn verify_lxc_mp_string(s: &str) -> Result<(), Error> {
pub fn verify_ip_with_ll_iface(s: &str) -> Result<(), Error> {
if let Some(percent) = s.find('%')
- && FE80_RE.is_match(s) && IFACE_RE.is_match(&s[(percent + 1)..]) {
- return verify_ipv6(&s[..percent]);
- }
+ && FE80_RE.is_match(s)
+ && IFACE_RE.is_match(&s[(percent + 1)..])
+ {
+ return verify_ipv6(&s[..percent]);
+ }
verify_ip(s)
}
--
2.47.3
_______________________________________________
pbs-devel mailing list
pbs-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
next prev parent reply other threads:[~2026-01-26 15:13 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-26 15:13 [pbs-devel] [PATCH proxmox 00/10] Bump edition to 2024 Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 01/10] adapt to rust 2024 match ergonomics Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 02/10] rustfmt: Set style_edition to 2021 Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 03/10] cargo: set workspace edition to 2024 Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 04/10] cargo: run fmt Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 05/10] cargo: set resolver to 3 Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 06/10] cargo: run --fix Maximiliano Sandoval
2026-01-26 15:13 ` Maximiliano Sandoval [this message]
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 08/10] Remove rustfmt.toml and run cargo fmt Maximiliano Sandoval
2026-01-26 15:13 ` [pbs-devel] [PATCH proxmox 10/10] pve-api-types: specify rustfmt --edition 2024 Maximiliano Sandoval
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260126151349.627829-8-m.sandoval@proxmox.com \
--to=m.sandoval@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.