@@ -30,7 +30,7 @@ pub(super) async fn console_auto_stop(&self) {
|
||||
/// Execute admin commands after startup
|
||||
#[implement(super::Service)]
|
||||
pub(super) async fn startup_execute(&self) -> Result {
|
||||
// List of comamnds to execute
|
||||
// List of commands to execute
|
||||
let commands = &self.services.server.config.admin_execute;
|
||||
|
||||
// Determine if we're running in smoketest-mode which will change some behaviors
|
||||
@@ -74,7 +74,7 @@ pub(super) async fn startup_execute(&self) -> Result {
|
||||
/// Execute admin commands after signal
|
||||
#[implement(super::Service)]
|
||||
pub(super) async fn signal_execute(&self) -> Result {
|
||||
// List of comamnds to execute
|
||||
// List of commands to execute
|
||||
let commands = self
|
||||
.services
|
||||
.server
|
||||
|
||||
@@ -172,7 +172,7 @@ impl Service {
|
||||
.map_err(|e| err!("Failed to enqueue admin command: {e:?}"))
|
||||
}
|
||||
|
||||
/// Dispatches a comamnd to the processor on the current task and waits for
|
||||
/// Dispatches a command to the processor on the current task and waits for
|
||||
/// completion.
|
||||
pub async fn command_in_place(
|
||||
&self,
|
||||
|
||||
@@ -26,7 +26,7 @@ impl NamespaceRegex {
|
||||
false
|
||||
}
|
||||
|
||||
/// Checks if this namespace has exlusive rights to a namespace
|
||||
/// Checks if this namespace has exclusive rights to a namespace
|
||||
#[inline]
|
||||
#[must_use]
|
||||
pub fn is_exclusive_match(&self, heystack: &str) -> bool {
|
||||
|
||||
@@ -350,7 +350,7 @@ fn handle_federation_error(
|
||||
return fallback();
|
||||
}
|
||||
|
||||
// Reached for 5xx errors. This is where we don't fallback given the likelyhood
|
||||
// Reached for 5xx errors. This is where we don't fallback given the likelihood
|
||||
// the other endpoint will also be a 5xx and we're wasting time.
|
||||
error
|
||||
}
|
||||
@@ -368,7 +368,7 @@ pub async fn fetch_remote_thumbnail_legacy(
|
||||
|
||||
self.check_legacy_freeze()?;
|
||||
self.check_fetch_authorized(&mxc)?;
|
||||
let reponse = self
|
||||
let response = self
|
||||
.services
|
||||
.sending
|
||||
.send_federation_request(mxc.server_name, media::get_content_thumbnail::v3::Request {
|
||||
@@ -385,10 +385,17 @@ pub async fn fetch_remote_thumbnail_legacy(
|
||||
.await?;
|
||||
|
||||
let dim = Dim::from_ruma(body.width, body.height, body.method.clone())?;
|
||||
self.upload_thumbnail(&mxc, None, None, reponse.content_type.as_deref(), &dim, &reponse.file)
|
||||
.await?;
|
||||
self.upload_thumbnail(
|
||||
&mxc,
|
||||
None,
|
||||
None,
|
||||
response.content_type.as_deref(),
|
||||
&dim,
|
||||
&response.file,
|
||||
)
|
||||
.await?;
|
||||
|
||||
Ok(reponse)
|
||||
Ok(response)
|
||||
}
|
||||
|
||||
#[implement(super::Service)]
|
||||
|
||||
@@ -308,7 +308,7 @@ impl super::Service {
|
||||
expire: CachedOverride::default_expire(),
|
||||
overriding: (hostname != untername)
|
||||
.then_some(hostname.into())
|
||||
.inspect(|_| debug_info!("{untername:?} overriden by {hostname:?}")),
|
||||
.inspect(|_| debug_info!("{untername:?} overridden by {hostname:?}")),
|
||||
});
|
||||
|
||||
Ok(())
|
||||
|
||||
@@ -443,7 +443,7 @@ async fn get_room_summary(
|
||||
Ok(summary)
|
||||
}
|
||||
|
||||
/// With the given identifier, checks if a room is accessable
|
||||
/// With the given identifier, checks if a room is accessible
|
||||
#[implement(Service)]
|
||||
async fn is_accessible_child<'a, I>(
|
||||
&self,
|
||||
|
||||
Reference in New Issue
Block a user