diff --git a/backend/src/net/cert_resolver.rs b/backend/src/net/cert_resolver.rs
index 9a24144aa..f9ac8966f 100644
--- a/backend/src/net/cert_resolver.rs
+++ b/backend/src/net/cert_resolver.rs
@@ -147,21 +147,21 @@ impl EmbassyCertResolver {
let private_keys = package_cert_data
.0
.private_key_to_der()
- .map_err(|err| Error::new(eyre!("err {}", err), crate::ErrorKind::BytesError))?;
+ .map_err(|err| Error::new(eyre!("{}", err), crate::ErrorKind::OpenSsl))?;
let mut full_rustls_certs = Vec::new();
for cert in x509_cert_chain.iter() {
- let cert =
- Certificate(cert.to_der().map_err(|err| {
- Error::new(eyre!("err: {}", err), crate::ErrorKind::BytesError)
- })?);
+ let cert = Certificate(
+ cert.to_der()
+ .map_err(|err| Error::new(eyre!("{}", err), crate::ErrorKind::OpenSsl))?,
+ );
full_rustls_certs.push(cert);
}
let pre_sign_key = PrivateKey(private_keys);
let actual_sign_key = any_supported_type(&pre_sign_key)
- .map_err(|err| Error::new(eyre!("{}", err), crate::ErrorKind::SignError))?;
+ .map_err(|err| Error::new(eyre!("{}", err), crate::ErrorKind::OpenSsl))?;
let cert_key = CertifiedKey::new(full_rustls_certs, actual_sign_key);
diff --git a/backend/src/net/net_utils.rs b/backend/src/net/net_utils.rs
index 97ca85999..380ec5f9b 100644
--- a/backend/src/net/net_utils.rs
+++ b/backend/src/net/net_utils.rs
@@ -15,7 +15,7 @@ pub fn host_addr_fqdn(req: &Request
) -> Result {
Some(host) => {
let host_str = host
.to_str()
- .map_err(|e| Error::new(eyre!("{}", e), crate::ErrorKind::AsciiError))?
+ .map_err(|e| Error::new(eyre!("{}", e), crate::ErrorKind::Ascii))?
.to_string();
let host_uri: ResourceFqdn = host_str.split(':').next().unwrap().parse()?;
@@ -23,7 +23,10 @@ pub fn host_addr_fqdn(req: &Request) -> Result {
Ok(host_uri)
}
- None => Err(Error::new(eyre!("No Host"), crate::ErrorKind::NoHost)),
+ None => Err(Error::new(
+ eyre!("No Host header"),
+ crate::ErrorKind::MissingHeader,
+ )),
}
}
diff --git a/backend/src/net/proxy_controller.rs b/backend/src/net/proxy_controller.rs
index a6855ff8f..c166bd46d 100644
--- a/backend/src/net/proxy_controller.rs
+++ b/backend/src/net/proxy_controller.rs
@@ -346,13 +346,13 @@ impl ProxyControllerInner {
removed_server.shutdown.send(()).map_err(|_| {
Error::new(
eyre!("Hyper server did not quit properly"),
- crate::ErrorKind::JoinError,
+ crate::ErrorKind::Unknown,
)
})?;
removed_server
.handle
.await
- .with_kind(crate::ErrorKind::JoinError)?;
+ .with_kind(crate::ErrorKind::Unknown)?;
self.docker_interfaces.remove(&package.clone());
self.docker_iface_lookups
.remove(&(package.clone(), interface_id));
diff --git a/backend/src/os_install.rs b/backend/src/os_install.rs
index 7bbcb1e4b..179490149 100644
--- a/backend/src/os_install.rs
+++ b/backend/src/os_install.rs
@@ -37,7 +37,23 @@ pub fn disk() -> Result<(), Error> {
#[command(display(display_none))]
pub async fn list() -> Result, Error> {
- crate::disk::util::list(&Default::default()).await
+ let skip = Path::new(
+ &String::from_utf8(
+ Command::new("grub-probe-default")
+ .arg("-t")
+ .arg("disk")
+ .arg("/cdrom")
+ .invoke(crate::ErrorKind::Grub)
+ .await?,
+ )?
+ .trim(),
+ )
+ .to_owned();
+ Ok(crate::disk::util::list(&Default::default())
+ .await?
+ .into_iter()
+ .filter(|i| &*i.logicalname != skip)
+ .collect())
}
pub async fn find_wifi_iface() -> Result