@@ -29,7 +29,7 @@ impl MacOSJail {
29
29
fn ensure_group ( & mut self ) -> Result < u32 > {
30
30
// Check if group already exists
31
31
let output = Command :: new ( "dscl" )
32
- . args ( & [
32
+ . args ( [
33
33
"." ,
34
34
"-read" ,
35
35
& format ! ( "/Groups/{}" , GROUP_NAME ) ,
@@ -41,20 +41,20 @@ impl MacOSJail {
41
41
if output. status . success ( ) {
42
42
// Parse GID from output
43
43
let stdout = String :: from_utf8_lossy ( & output. stdout ) ;
44
- if let Some ( line) = stdout. lines ( ) . find ( |l| l. contains ( "PrimaryGroupID" ) ) {
45
- if let Some ( gid_str) = line. split_whitespace ( ) . last ( ) {
46
- let gid = gid_str . parse :: < u32 > ( ) . context ( "Failed to parse GID" ) ? ;
47
- info ! ( "Using existing group {} with GID {}" , GROUP_NAME , gid ) ;
48
- self . group_gid = Some ( gid) ;
49
- return Ok ( gid) ;
50
- }
44
+ if let Some ( line) = stdout. lines ( ) . find ( |l| l. contains ( "PrimaryGroupID" ) )
45
+ && let Some ( gid_str) = line. split_whitespace ( ) . last ( )
46
+ {
47
+ let gid = gid_str . parse :: < u32 > ( ) . context ( "Failed to parse GID" ) ? ;
48
+ info ! ( "Using existing group {} with GID {}" , GROUP_NAME , gid) ;
49
+ self . group_gid = Some ( gid) ;
50
+ return Ok ( gid ) ;
51
51
}
52
52
}
53
53
54
54
// Create group if it doesn't exist
55
55
info ! ( "Creating group {}" , GROUP_NAME ) ;
56
56
let output = Command :: new ( "sudo" )
57
- . args ( & [ "dseditgroup" , "-o" , "create" , GROUP_NAME ] )
57
+ . args ( [ "dseditgroup" , "-o" , "create" , GROUP_NAME ] )
58
58
. output ( )
59
59
. context ( "Failed to create group" ) ?;
60
60
@@ -67,7 +67,7 @@ impl MacOSJail {
67
67
68
68
// Get the newly created group's GID
69
69
let output = Command :: new ( "dscl" )
70
- . args ( & [
70
+ . args ( [
71
71
"." ,
72
72
"-read" ,
73
73
& format ! ( "/Groups/{}" , GROUP_NAME ) ,
@@ -77,13 +77,13 @@ impl MacOSJail {
77
77
. context ( "Failed to read group GID" ) ?;
78
78
79
79
let stdout = String :: from_utf8_lossy ( & output. stdout ) ;
80
- if let Some ( line) = stdout. lines ( ) . find ( |l| l. contains ( "PrimaryGroupID" ) ) {
81
- if let Some ( gid_str) = line. split_whitespace ( ) . last ( ) {
82
- let gid = gid_str . parse :: < u32 > ( ) . context ( "Failed to parse GID" ) ? ;
83
- info ! ( "Created group {} with GID {}" , GROUP_NAME , gid ) ;
84
- self . group_gid = Some ( gid) ;
85
- return Ok ( gid) ;
86
- }
80
+ if let Some ( line) = stdout. lines ( ) . find ( |l| l. contains ( "PrimaryGroupID" ) )
81
+ && let Some ( gid_str) = line. split_whitespace ( ) . last ( )
82
+ {
83
+ let gid = gid_str . parse :: < u32 > ( ) . context ( "Failed to parse GID" ) ? ;
84
+ info ! ( "Created group {} with GID {}" , GROUP_NAME , gid) ;
85
+ self . group_gid = Some ( gid) ;
86
+ return Ok ( gid ) ;
87
87
}
88
88
89
89
anyhow:: bail!( "Failed to get GID for group {}" , GROUP_NAME )
@@ -122,7 +122,7 @@ pass on lo0
122
122
// Load rules into anchor
123
123
info ! ( "Loading PF rules from {}" , self . pf_rules_path) ;
124
124
let output = Command :: new ( "sudo" )
125
- . args ( & [ "pfctl" , "-a" , PF_ANCHOR_NAME , "-f" , & self . pf_rules_path ] )
125
+ . args ( [ "pfctl" , "-a" , PF_ANCHOR_NAME , "-f" , & self . pf_rules_path ] )
126
126
. output ( )
127
127
. context ( "Failed to load PF rules" ) ?;
128
128
@@ -134,7 +134,7 @@ pass on lo0
134
134
}
135
135
136
136
// Enable PF if not already enabled
137
- let _ = Command :: new ( "sudo" ) . args ( & [ "pfctl" , "-E" ] ) . output ( ) ;
137
+ let _ = Command :: new ( "sudo" ) . args ( [ "pfctl" , "-E" ] ) . output ( ) ;
138
138
139
139
info ! ( "PF rules loaded successfully" ) ;
140
140
Ok ( ( ) )
@@ -146,7 +146,7 @@ pass on lo0
146
146
147
147
// Flush the anchor
148
148
let output = Command :: new ( "sudo" )
149
- . args ( & [ "pfctl" , "-a" , PF_ANCHOR_NAME , "-F" , "all" ] )
149
+ . args ( [ "pfctl" , "-a" , PF_ANCHOR_NAME , "-F" , "all" ] )
150
150
. output ( )
151
151
. context ( "Failed to flush PF anchor" ) ?;
152
152
@@ -170,7 +170,7 @@ impl Jail for MacOSJail {
170
170
fn setup ( & mut self , _proxy_port : u16 ) -> Result < ( ) > {
171
171
// Check if we have sudo access
172
172
let output = Command :: new ( "sudo" )
173
- . args ( & [ "-n" , "true" ] )
173
+ . args ( [ "-n" , "true" ] )
174
174
. output ( )
175
175
. context ( "Failed to check sudo access" ) ?;
176
176
@@ -182,7 +182,7 @@ impl Jail for MacOSJail {
182
182
183
183
// Check if PF is available
184
184
let output = Command :: new ( "pfctl" )
185
- . args ( & [ "-s" , "info" ] )
185
+ . args ( [ "-s" , "info" ] )
186
186
. output ( )
187
187
. context ( "Failed to check PF availability" ) ?;
188
188
0 commit comments